Mostrando 21 - 40 Resultados de 348 Para Buscar 'Real Santander', tiempo de consulta: 0.07s Limitar resultados
  1. 21
  2. 22
    Libro
  3. 23
    991005213729706719
  4. 24
    Libro
  5. 25
    Libro
  6. 26
    por Fernández Teijeiro, Juan José
    Publicado 2011
    Libro
  7. 27
    Libro
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
    991005675659706719
  13. 33
    por Duval, Dominique
    Publicado 1993
    Libro
  14. 34
  15. 35
    Publicado 2023
    Tabla de Contenidos: “…8.1.1 Different Types of Cryptography -- 8.1.1.1 Symmetric Key Cryptography -- 8.1.1.2 Asymmetric Key Cryptography -- 8.1.1.3 Hash Functions -- 8.1.2 Cryptographic Schemes -- 8.1.2.1 Simple Substitution Cipher -- 8.1.2.2 Caesar Cipher -- 8.1.2.3 Vigenère Cipher -- 8.1.2.4 Transposition Cipher -- 8.2 Playfair Cipher -- 8.2.1 Encryption Algorithm -- 8.2.1.1 Step 1 - Generate Squares (5 * 5) -- 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext -- 8.2.2 Decryption Algorithm -- 8.2.2.1 Step 1 - Generate Squares (5 * 5) -- 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext -- 8.2.3 Advantages and Disadvantages -- 8.2.3.1 Advantages -- 8.2.3.2 Disadvantages -- 8.3 Hill Cipher -- 8.3.1 Substitution Scheme -- 8.3.1.1 Encryption -- 8.3.1.2 Decryption -- 8.4 RSA Algorithm in Cryptography -- 8.4.1 Working Mechanism -- 8.4.1.1 Generating the Public Key -- 8.4.1.2 Generating a Private Key -- 8.5 Multiple Precision Arithmetic Library -- 8.5.1 GNU Multiple Precision Arithmetic Library -- 8.5.2 RSA Algorithm Implementation Using GMP Library -- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem -- 8.6 SHA-512 Hash in Java -- 8.7 Cybersecurity -- 8.7.1 Common Cyberattacks -- 8.7.1.1 Denial-of-Service Attacks -- 8.7.1.2 Malware -- 8.7.1.3 Man-in-the-Middle Attack -- 8.7.1.4 Phishing -- 8.7.1.5 Structured Language Query Injection -- 8.7.1.6 Latest Cyberthreats -- 8.7.2 Key Cybersecurity Features -- 8.7.3 Blockchain for Cybersecurity -- 8.7.4 Pros and Cons of Blockchain in Cybersecurity -- 8.7.4.1 Pros -- 8.7.4.2 Cons -- 8.7.5 Real-world Examples -- 8.7.5.1 Australian Government -- 8.7.5.2 Barclays -- 8.7.5.3 Chinese Military -- 8.7.5.4 Cisco -- 8.7.5.5 Coinbase -- 8.7.5.6 Colorado State -- 8.7.5.7 Founders Bank -- 8.7.5.8 Health Linkage -- 8.7.5.9 JP Morgan -- 8.7.5.10 Mobile Coin -- 8.7.5.11 Philips Healthcare -- 8.7.5.12 Santander Bank -- 8.7.5.13 Wall Street…”
    Libro electrónico
  16. 36
    Libro
  17. 37
    Libro
  18. 38
    Libro
  19. 39
  20. 40