BT种子基本信息
- 种子哈希:ba55c8527fc5ccb989c7135ca2cb37eddd1300f6
- 文档大小:2.0 GB
- 文档个数:104个文档
- 下载次数:1391次
- 下载速度:极快
- 收录时间:2020-04-04
- 最近下载:2024-12-18
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- 09. Symmetric Key Algorithms/09_05-Vigenere Symmetric Key Algorithm.mp4 32.1 MB
- 09. Symmetric Key Algorithms/09_16-MAC And HMAC.mp4 31.5 MB
- 09. Symmetric Key Algorithms/09_02-Symmetric Key Services.mp4 31.2 MB
- 09. Symmetric Key Algorithms/09_03-Symmetric Key Algorithms.mp4 30.7 MB
- 06. Information Systems And Application Architecture/06_11-Database Issues Part 2.mp4 28.4 MB
- 09. Symmetric Key Algorithms/09_13-Block Cipher Modes OFB And CFB.mp4 28.2 MB
- 03. Computer Hardware Architecture/03_05-Virtual Memory.mp4 27.7 MB
- 06. Information Systems And Application Architecture/06_07-Application Architecture.mp4 27.4 MB
- 04. Operating System Architecture/04_05-Processes Threads And Buffers.mp4 26.2 MB
- 10. Asymmetric Key Algorithms/10_06-Confidentiality And Digital Signature.mp4 25.8 MB
- 10. Asymmetric Key Algorithms/10_09-Asymmetric Key Algorithms Diffie Hellman Merkle.mp4 25.7 MB
- 10. Asymmetric Key Algorithms/10_08-SSL And TLS.mp4 25.5 MB
- 02. Security Models/02_07-TCB.mp4 25.5 MB
- 10. Asymmetric Key Algorithms/10_02-Asymmetric Key Services.mp4 25.3 MB
- 03. Computer Hardware Architecture/03_07-TPM.mp4 25.1 MB
- 08. Hashing Algorithms/08_05-Hashing Services.mp4 24.9 MB
- 10. Asymmetric Key Algorithms/10_10-RSA, ELGamal, ECC And DSS.mp4 24.9 MB
- 06. Information Systems And Application Architecture/06_12-Middleware.mp4 24.6 MB
- 04. Operating System Architecture/04_01-Overview.mp4 23.9 MB
- 05. Virtualization/05_01-Virtualization Overview Part 1.mp4 23.9 MB
- 10. Asymmetric Key Algorithms/10_04-Key Distribution And Digital Signature.mp4 23.8 MB
- 02. Security Models/02_02-BellLapadula.mp4 23.1 MB
- 03. Computer Hardware Architecture/03_02-CPU.mp4 22.9 MB
- 04. Operating System Architecture/04_06-Process And Memory Management.mp4 22.7 MB
- 05. Virtualization/05_02-Virtualization Overview Part 2.mp4 22.3 MB
- 12. Attacks On Cryptography/12_03-Plaintext, Ciphertext And Adaptive.mp4 22.1 MB
- 10. Asymmetric Key Algorithms/10_03-Asymmetric Key Management.mp4 21.6 MB
- 08. Hashing Algorithms/08_03-Hashing Algorithms.mp4 21.3 MB
- 10. Asymmetric Key Algorithms/10_01-Asymmetric Key Cryptography.mp4 21.3 MB
- 06. Information Systems And Application Architecture/06_14-Web Applications.mp4 21.2 MB
- 09. Symmetric Key Algorithms/09_10-DES And 3DES.mp4 21.1 MB
- 06. Information Systems And Application Architecture/06_03-Architecture Part 3.mp4 21.1 MB
- 11. Cryptography In Use/11_01-Link EndToEnd PKI.mp4 21.0 MB
- 09. Symmetric Key Algorithms/09_01-Symmetric Key Cryptography.mp4 20.8 MB
- 02. Security Models/02_03-Biba.mp4 20.6 MB
- 04. Operating System Architecture/04_09-Hardened Server.mp4 20.4 MB
- 11. Cryptography In Use/11_05-Set.mp4 20.4 MB
- 03. Computer Hardware Architecture/03_01-Overview.mp4 20.4 MB
- 01. Security Engineering Introduction/01_01-Introduction.mp4 20.3 MB
- 09. Symmetric Key Algorithms/09_11-AES, Block Ciphers And Variables.mp4 20.2 MB
- 06. Information Systems And Application Architecture/06_16-Mobile Code XSS.mp4 19.8 MB
- 09. Symmetric Key Algorithms/09_12-Block Cipher Modes ECB And CBC.mp4 19.7 MB
- 02. Security Models/02_08-TCSEC.mp4 19.7 MB
- 03. Computer Hardware Architecture/03_06-Memory.mp4 19.7 MB
- 07. Introduction To Cryptography/07_06-Key Management.mp4 19.6 MB
- 10. Asymmetric Key Algorithms/10_11-Asymmetric Key Cryptography Review.mp4 19.5 MB
- 09. Symmetric Key Algorithms/09_08-Hebern, Enigma, Feistel, S And T.mp4 19.4 MB
- 13. Physical Security/13_06-Fire Safety.mp4 19.3 MB
- 02. Security Models/02_04-Applying The Models.mp4 19.2 MB
- 13. Physical Security/13_02-Goals And Facility.mp4 19.2 MB
- 06. Information Systems And Application Architecture/06_01-Architecture Part 1.mp4 19.1 MB
- 11. Cryptography In Use/11_06-VPN, SSL, TLS And Protocols.mp4 19.1 MB
- 12. Attacks On Cryptography/12_02-Brute Force, Dictionary, Hybrid And Rainbow.mp4 19.0 MB
- 06. Information Systems And Application Architecture/06_17-Mobile Code Java ActiveX.mp4 18.7 MB
- 14. Conclusion/14_01-Wrap Up.mp4 18.7 MB
- 04. Operating System Architecture/04_03-Kernel Mode.mp4 18.6 MB
- 13. Physical Security/13_05-Electrical Issues.mp4 18.5 MB
- 02. Security Models/02_01-Introduction To Security Models.mp4 18.4 MB
- 08. Hashing Algorithms/08_01-Introduction To Hashing Algorithms.mp4 18.3 MB
- 06. Information Systems And Application Architecture/06_08-Databases Part 1.mp4 18.3 MB
- 10. Asymmetric Key Algorithms/10_05-Digital Signature.mp4 17.9 MB
- 13. Physical Security/13_01-Introduction To Physical Security.mp4 17.8 MB
- 03. Computer Hardware Architecture/03_04-Memory.mp4 17.8 MB
- 13. Physical Security/13_08-Fire Extinguishers And Sprinklers.mp4 17.6 MB
- 04. Operating System Architecture/04_08-System Self Protection.mp4 17.6 MB
- 06. Information Systems And Application Architecture/06_04-Cloud Computing Part 1.mp4 17.5 MB
- 12. Attacks On Cryptography/12_01-Introduction To Attacks On Cryptography.mp4 17.5 MB
- 04. Operating System Architecture/04_02-Four Ring Architecture.mp4 17.3 MB
- 13. Physical Security/13_03-Perimeter Defense And Access Control.mp4 16.9 MB
- 06. Information Systems And Application Architecture/06_10-Database Issues Part 1.mp4 16.9 MB
- 02. Security Models/02_05-ClarkWilson.mp4 16.9 MB
- 06. Information Systems And Application Architecture/06_15-Mobile Code Cookies.mp4 16.7 MB
- 09. Symmetric Key Algorithms/09_07-Kerckhoffs And Gilbert Vernam.mp4 16.6 MB
- 09. Symmetric Key Algorithms/09_17-CBCMAC And Symmetric Summary.mp4 16.4 MB
- 13. Physical Security/13_09-Gas Suppressants And Fire Training.mp4 16.3 MB
- 11. Cryptography In Use/11_04-PGP And SMIME.mp4 16.3 MB
- 04. Operating System Architecture/04_04-Features.mp4 16.2 MB
- 06. Information Systems And Application Architecture/06_13-Mining Databases.mp4 16.1 MB
- 04. Operating System Architecture/04_07-Reference Monitor.mp4 16.1 MB
- 07. Introduction To Cryptography/07_04-Strong Cryptography.mp4 16.0 MB
- 06. Information Systems And Application Architecture/06_05-Cloud Computing Part 2.mp4 15.9 MB
- 07. Introduction To Cryptography/07_01-Cryptography Part 1.mp4 15.7 MB
- 08. Hashing Algorithms/08_02-How Hashing Works.mp4 15.7 MB
- 13. Physical Security/13_04-Security Zones And Environment.mp4 15.6 MB
- 09. Symmetric Key Algorithms/09_09-Block Ciphers And Stream Ciphers.mp4 15.5 MB
- 06. Information Systems And Application Architecture/06_02-Architecture Part 2.mp4 15.4 MB
- 06. Information Systems And Application Architecture/06_09-Databases Part 2.mp4 15.1 MB
- 03. Computer Hardware Architecture/03_03-Motherboard.mp4 15.0 MB
- 06. Information Systems And Application Architecture/06_06-IoT And Industrial Controls.mp4 15.0 MB
- 11. Cryptography In Use/11_03-PKI Part 2.mp4 14.9 MB
- 02. Security Models/02_10-Common Criteria.mp4 14.3 MB
- 09. Symmetric Key Algorithms/09_15-Message Authentication Code.mp4 13.8 MB
- 07. Introduction To Cryptography/07_02-Cryptography Part 2.mp4 13.1 MB
- 02. Security Models/02_06-ClarkWilson BrewerNash.mp4 13.0 MB
- 06. Information Systems And Application Architecture/06_18-Web Applications Browser Email.mp4 12.8 MB
- 07. Introduction To Cryptography/07_05-Cryptographic Keys.mp4 12.4 MB
- 13. Physical Security/13_07-Fire Detectors.mp4 11.8 MB
- 07. Introduction To Cryptography/07_03-Cryptographic Algorithms.mp4 11.2 MB
- 09. Symmetric Key Algorithms/09_04-Cracking Symmetric Key Algorithms.mp4 10.5 MB
- 09. Symmetric Key Algorithms/09_14-Block Cipher Modes CTR.mp4 10.4 MB
- 02. Security Models/02_09-ITSEC.mp4 10.4 MB
- 06. Information Systems And Application Architecture/06_19-Web Applications Input Validation.mp4 10.4 MB
- 08. Hashing Algorithms/08_04-Strong Hashing Algorithms.mp4 9.5 MB
- 06. Information Systems And Application Architecture/06_20-Web Applications OWASP.mp4 6.6 MB
==查看完整文档列表==