Смотреть фильмы онлайн

Data Interception and Public Key Encryption - Information Security Lesson

   
- HD качество

Найдено 328 видео
Data Interception and Public Key Encryption - Information Security Lesson #9 of 12
Загружен 5 ноября 2013
Dr. Soper discusses malicious data interception and public key encryption. Topics covered include wiretapping, defending against message interception, ...

Data Interception and Public Key Encryption - Information Security Lesson #9 of 12
Загружен 30 декабря 2015
Dr. Soper discusses malicious data interception and public key encryption. Topics covered include wiretapping, defending against message interception, ...

Data Interception and Public Key Encryption - Information Security Lesson #9 of 12
Загружен 25 августа 2017
[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th .

Encryption Concepts - Information Security Lesson #6 of 12
Загружен 11 октября 2013
Dr. Soper discusses encryption concepts. Topics covered include encryption algorithms, keyed and keyless cryptosystems, cryptanalysis, breaking encrypted ...

Illicit Data Interception and Access - Information Security Lesson #5 of 12
Загружен 2 октября 2013
Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle attacks, ...

Cryptography basics: What is Encryption and Decryption
Загружен 28 апреля 2014
Get Full Course:

Forgeries and Digital Identities - Information Security Lesson #10 of 12
Загружен 13 ноября 2013
Dr. Soper discusses forgeries of digital artifacts and digital identities. Topics covered include forged email messages, phishing, spam, forged websites and ...

Identification and Authentication - Information Security Lesson #2 of 12
Загружен 11 сентября 2013
Dr. Soper discusses identification and authentication issues in the context of computer security. Topics covered include controlled access, impersonation, ...

Cyber Security #2: Measures
Загружен 18 октября 2017
Second part of this topic covering encryption, firewalls, MAC address filtering, biometrics and more. Any questions/ feedback/ enquiries: ...

Software Program Security - Information Security Lesson #3 of 12
Загружен 13 сентября 2013
Dr. Soper discusses software program security. Topics covered include incomplete mediation, race conditions, time-of-check to time-of-use vulnerabilities, ...

CS144 Fall 2013, Video 8-8: Public Key Cryptography
Загружен 7 ноября 2013

Introduction to Computer Security - Information Security Lesson #1 of 12
Загружен 6 сентября 2013
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, ...

Wireless Security - Information Security Lesson #8 of 12
Загружен 29 октября 2013
Dr. Soper discusses security for wireless networks. Topics covered include wireless network concepts, wireless communication, the 802.11 protocol suite, ...

Encryption Concepts - Information Security Lesson #6 of 12
Загружен 30 декабря 2015
Dr. Soper discusses encryption concepts. Topics covered include encryption algorithms, keyed and keyless cryptosystems, cryptanalysis, breaking encrypted ...

Cipherra! – Your Key to Data Security
Загружен 18 марта 2015
Cipherra has developed the first highly protected, cloud-based, enterprise-level data encryption platform, compliant with leading security standards. Cipherra's ...

 1 2 3 »  Последняя

Мир в онлайне