Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 32
- Sermones 9
- Obras anteriores a 1800 7
- Predicación 6
- Sermones españoles 6
- Crítica e interpretación 5
- Oratoria Sagrada 5
- Orden público 5
- Sermons castellans 5
- - Sermones 4
- Física 4
- Història 4
- Medicina 4
- Sacerdotes 4
- enseñanza 4
- obras anteriores a 1800 4
- Algebra (Informática) 3
- Guerra Civil Espanyola, 1936-1939 3
- Historia y crítica 3
- Menéndez y Pelayo, Marcelino 3
- Misiones 3
- Nobleza 3
- Predicacion 3
- Sermones para el año liturgico 3
- Anatomía 2
- Behetrías 2
- Canciones populares 2
- Corazón 2
- Derecho 2
- Educación- 2
-
21
-
22
-
23
-
24
-
25
-
26
-
27
-
28
-
29
-
30
-
31
-
32
-
33
-
34
-
35Publicado 2023Tabla de Contenidos: “…8.1.1 Different Types of Cryptography -- 8.1.1.1 Symmetric Key Cryptography -- 8.1.1.2 Asymmetric Key Cryptography -- 8.1.1.3 Hash Functions -- 8.1.2 Cryptographic Schemes -- 8.1.2.1 Simple Substitution Cipher -- 8.1.2.2 Caesar Cipher -- 8.1.2.3 Vigenère Cipher -- 8.1.2.4 Transposition Cipher -- 8.2 Playfair Cipher -- 8.2.1 Encryption Algorithm -- 8.2.1.1 Step 1 - Generate Squares (5 * 5) -- 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext -- 8.2.2 Decryption Algorithm -- 8.2.2.1 Step 1 - Generate Squares (5 * 5) -- 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext -- 8.2.3 Advantages and Disadvantages -- 8.2.3.1 Advantages -- 8.2.3.2 Disadvantages -- 8.3 Hill Cipher -- 8.3.1 Substitution Scheme -- 8.3.1.1 Encryption -- 8.3.1.2 Decryption -- 8.4 RSA Algorithm in Cryptography -- 8.4.1 Working Mechanism -- 8.4.1.1 Generating the Public Key -- 8.4.1.2 Generating a Private Key -- 8.5 Multiple Precision Arithmetic Library -- 8.5.1 GNU Multiple Precision Arithmetic Library -- 8.5.2 RSA Algorithm Implementation Using GMP Library -- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem -- 8.6 SHA-512 Hash in Java -- 8.7 Cybersecurity -- 8.7.1 Common Cyberattacks -- 8.7.1.1 Denial-of-Service Attacks -- 8.7.1.2 Malware -- 8.7.1.3 Man-in-the-Middle Attack -- 8.7.1.4 Phishing -- 8.7.1.5 Structured Language Query Injection -- 8.7.1.6 Latest Cyberthreats -- 8.7.2 Key Cybersecurity Features -- 8.7.3 Blockchain for Cybersecurity -- 8.7.4 Pros and Cons of Blockchain in Cybersecurity -- 8.7.4.1 Pros -- 8.7.4.2 Cons -- 8.7.5 Real-world Examples -- 8.7.5.1 Australian Government -- 8.7.5.2 Barclays -- 8.7.5.3 Chinese Military -- 8.7.5.4 Cisco -- 8.7.5.5 Coinbase -- 8.7.5.6 Colorado State -- 8.7.5.7 Founders Bank -- 8.7.5.8 Health Linkage -- 8.7.5.9 JP Morgan -- 8.7.5.10 Mobile Coin -- 8.7.5.11 Philips Healthcare -- 8.7.5.12 Santander Bank -- 8.7.5.13 Wall Street…”
Libro electrónico -
36
-
37
-
38
-
39
-
40