TorBT - Torrents and Magnet Links Search Engine

[Pluralsight] Cryptography Fundamentals for Java and .NET Developers

File Name
Size
01. History of Cryptography/01_01-Introduction.mp4
11 MB
01. History of Cryptography/01_02-One-Time Pads.mp4
6.5 MB
01. History of Cryptography/01_03-Entropy.mp4
8.4 MB
01. History of Cryptography/01_04-The Enigma Machine.mp4
12 MB
01. History of Cryptography/01_05-Cryptanalysis.mp4
10 MB
01. History of Cryptography/01_06-Diffie-Hellman.mp4
15 MB
01. History of Cryptography/01_07-Diffie-Hellman Example.mp4
11 MB
01. History of Cryptography/01_08-Conclusion.mp4
2.3 MB
02. Algorithms/02_01-Introduction.mp4
1.1 MB
02. Algorithms/02_02-Block Ciphers.mp4
3.1 MB
02. Algorithms/02_03-Confusion and Key Schedules.mp4
1.9 MB
02. Algorithms/02_04-Diffusion and Cipher Block Chaining.mp4
3.5 MB
02. Algorithms/02_05-Initialization Vectors.mp4
1.4 MB
02. Algorithms/02_06-DES.mp4
1.9 MB
02. Algorithms/02_07-AES.mp4
5.1 MB
02. Algorithms/02_08-Modern Cryptanalysis.mp4
3.0 MB
02. Algorithms/02_09-Compression and Error Correction.mp4
6.0 MB
02. Algorithms/02_10-Public and Private Keys.mp4
4.5 MB
02. Algorithms/02_11-Inverse Exponents Example.mp4
7.2 MB
02. Algorithms/02_12-Finding Inverse Exponents.mp4
5.7 MB
02. Algorithms/02_13-The RSA Algorithm.mp4
3.7 MB
02. Algorithms/02_14-Patterns in RSA.mp4
7.6 MB
02. Algorithms/02_15-Elliptic Curve.mp4
5.3 MB
02. Algorithms/02_16-Digital Signatures.mp4
4.2 MB
02. Algorithms/02_17-Hashing Algorithms.mp4
4.8 MB
02. Algorithms/02_18-Birthday Attack.mp4
7.5 MB
02. Algorithms/02_19-Trust.mp4
3.2 MB
02. Algorithms/02_20-Summary.mp4
1.8 MB
03. APIs/03_01-Symmetric Java APIs.mp4
4.9 MB
03. APIs/03_02-AES in Java.mp4
32 MB
03. APIs/03_03-Asymmetric Java APIs.mp4
2.8 MB
03. APIs/03_04-RSA in Java.mp4
28 MB
03. APIs/03_05-Bouncy Castle for Java.mp4
6.4 MB
03. APIs/03_06-.NET Crypto API.mp4
1.7 MB
03. APIs/03_07-AES in .NET.mp4
30 MB
03. APIs/03_08-RSA in .NET.mp4
38 MB
03. APIs/03_09-Summary.mp4
1.7 MB
04. Transport Layer Security/04_01-X.509 Certificates.mp4
13 MB
04. Transport Layer Security/04_02-RSA Key Pair.mp4
7.4 MB
04. Transport Layer Security/04_03-Certificate Signing Request.mp4
12 MB
04. Transport Layer Security/04_04-Personal Information Exchange.mp4
18 MB
04. Transport Layer Security/04_05-IIS.mp4
9.8 MB
04. Transport Layer Security/04_06-Tomcat.mp4
4.5 MB
04. Transport Layer Security/04_07-Naked Keys.mp4
1.3 MB
04. Transport Layer Security/04_08-Apache.mp4
4.6 MB
04. Transport Layer Security/04_09-Summary.mp4
1.2 MB
05. Authentication and Authorization/05_01-Passwords.mp4
3.7 MB
05. Authentication and Authorization/05_02-Hashed Passwords.mp4
3.7 MB
05. Authentication and Authorization/05_03-Rainbow Tables.mp4
6.1 MB
05. Authentication and Authorization/05_04-Salted Hashed Passwords.mp4
2.9 MB
05. Authentication and Authorization/05_05-Computing Password Entropy.mp4
6.3 MB
05. Authentication and Authorization/05_06-Password Based Key Derivation Functions.mp4
7.2 MB
05. Authentication and Authorization/05_07-Progressive Salted Hashed Passwords.mp4
4.0 MB
05. Authentication and Authorization/05_08-Federation.mp4
6.5 MB
05. Authentication and Authorization/05_09-Kerberos.mp4
2.0 MB
05. Authentication and Authorization/05_10-WS-Trust and WS-Federation.mp4
4.4 MB
05. Authentication and Authorization/05_11-XML Signature Wrapping Attacks.mp4
3.5 MB
05. Authentication and Authorization/05_12-OAuth.mp4
9.9 MB
05. Authentication and Authorization/05_13-OpenID Connect.mp4
4.1 MB
05. Authentication and Authorization/05_14-Conclusion.mp4
1.7 MB
06. Case Studies/06_01-Snapchat.mp4
8.3 MB
06. Case Studies/06_02-Safari.mp4
6.0 MB
06. Case Studies/06_03-Heartbleed.mp4
9.7 MB
06. Case Studies/06_04-Target.mp4
13 MB
06. Case Studies/06_05-NSA.mp4
8.7 MB
06. Case Studies/06_06-Lessons Learned.mp4
1.8 MB
07. Decentralized Systems/07_01-PGP.mp4
5.0 MB
07. Decentralized Systems/07_02-Establishing Trust.mp4
7.7 MB
07. Decentralized Systems/07_03-Hashcash.mp4
4.7 MB
07. Decentralized Systems/07_04-Bitcoin.mp4
6.0 MB
07. Decentralized Systems/07_05-Proof of Work.mp4
4.7 MB
07. Decentralized Systems/07_06-Conflict Resolution.mp4
5.8 MB
07. Decentralized Systems/07_07-Mining.mp4
4.1 MB
07. Decentralized Systems/07_08-Freenet.mp4
6.8 MB
07. Decentralized Systems/07_09-Untrusted Networks.mp4
9.9 MB
07. Decentralized Systems/07_10-Conclusion.mp4
4.5 MB