zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeCoursesOnline.Me] [Packt] Hands-On Cryptography with Java [FCO]
magnet:?xt=urn:btih:4480bb82daa3a2a0b666704515fd8d71965b9442&dn=[FreeCoursesOnline.Me] [Packt] Hands-On Cryptography with Java [FCO]
磁力链接详情
Hash值:
4480bb82daa3a2a0b666704515fd8d71965b9442
点击数:
225
文件大小:
745.79 MB
文件数量:
28
创建日期:
2020-11-29 10:45
最后访问:
2024-12-26 04:39
访问标签:
FreeCoursesOnline
Me
Packt
Hands-On
Cryptography
with
Java
FCO
文件列表详情
01.Cryptographic Introduction/0101.The Course Overview.mp4 4.99 MB
01.Cryptographic Introduction/0102.Goals of Cryptography and Where It Is Used.mp4 9.78 MB
01.Cryptographic Introduction/0103.History of Cryptography and Why You Shouldn’t Build New Algorithms.mp4 11 MB
01.Cryptographic Introduction/0104.The Architectural Layout of Modern Cryptography.mp4 10.38 MB
01.Cryptographic Introduction/0105.Concepts That Will Be Important Later.mp4 13.76 MB
02.Basic Ciphers/0201.Symmetric Ciphers and Where They Are Used.mp4 8.3 MB
02.Basic Ciphers/0202.Basic Encryption with Symmetric Ciphers.mp4 19.54 MB
02.Basic Ciphers/0203.Hashing and MessageDigest For Validations.mp4 21.23 MB
02.Basic Ciphers/0204.Common Security Flaws When Using Symmetric Ciphers.mp4 10.55 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0301.This section will cover how asymmetric cryptography works...mp4 37.58 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0302.Creating A KeyPairGenerator Instance.mp4 19.71 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0303.Storing the Java KeyStore.mp4 28.99 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0304.Java KeyTool.mp4 22.18 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0305.Creating A KeyGenerator Instance.mp4 83.12 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0306.Basic Encryption with Asymmetric Ciphers.mp4 28.51 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0307.What to Do When PKIX Validation Fails.mp4 58.86 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0308.Java Certificate Chains.mp4 69.19 MB
03.Advanced Ciphers, Asymmetric, and Public Key/0309.The Key Escrow Problem.mp4 46.1 MB
04.Hacking Techniques – Breaking and Bypassing/0401.Using Unique Keys and Certificates.mp4 12.11 MB
04.Hacking Techniques – Breaking and Bypassing/0402.Certificate Pinning.mp4 36.9 MB
04.Hacking Techniques – Breaking and Bypassing/0403.Signed JAR Files.mp4 28.55 MB
04.Hacking Techniques – Breaking and Bypassing/0404.Token Harvesting.mp4 12.9 MB
04.Hacking Techniques – Breaking and Bypassing/0405.When and How to Upgrade Algorithms.mp4 11.23 MB
04.Hacking Techniques – Breaking and Bypassing/0406.Standard Decompilation Tools.mp4 25.74 MB
05.Putting it all together/0501.Encrypting and Decrypting Files.mp4 23.71 MB
05.Putting it all together/0502.Obtaining Certificates from LetsEncrypt or AWS.mp4 52.51 MB
05.Putting it all together/0503.Qualys SSL Labs for Your Servers.mp4 19.76 MB
05.Putting it all together/0504.he DeepViolet Security Analyzer.mp4 18.61 MB
其他位置