种子简介
种子名称:
[FreeCourseLab.com] Udemy - Cryptography using Python
文件类型:
视频
文件数目:
42个文件
文件大小:
1.78 GB
收录时间:
2020-1-7 06:24
已经下载:
3次
资源热度:
148
最近下载:
2024-12-22 17:28
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:b6626f8a7b58194b1bdef5abbb88ee24d1f83305&dn=[FreeCourseLab.com] Udemy - Cryptography using Python
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCourseLab.com] Udemy - Cryptography using Python.torrent
1. Introduction/1. Introduction to Cryptography using Python.mp43.98MB
2. Getting Started Cryptography using Python/1. Understanding the Process of Cryptography.mp420.23MB
2. Getting Started Cryptography using Python/2. Purpose of Python as a Tool.mp427.29MB
2. Getting Started Cryptography using Python/3. Algorithm on Reverse Cipher.mp435.07MB
3. Ceaser Cipher Algorithm and Transposition Cipher/1. Understanding Ceaser Cipher.mp431.88MB
3. Ceaser Cipher Algorithm and Transposition Cipher/2. Algorithm on Pyperclip.mp433.58MB
3. Ceaser Cipher Algorithm and Transposition Cipher/3. Concept of Brute Force Attack.mp427.69MB
3. Ceaser Cipher Algorithm and Transposition Cipher/4. Functions of Transposition Cipher.mp417.65MB
3. Ceaser Cipher Algorithm and Transposition Cipher/5. Transposition Cipher Encryption Program.mp431.98MB
4. Cipher Decryption Program/1. Decryption of Transposition Cipher.mp447.77MB
4. Cipher Decryption Program/10. Learning the Substitution Cipher.mp439.41MB
4. Cipher Decryption Program/11. Implementing Substitution Cipher.mp451.7MB
4. Cipher Decryption Program/12. Functions of Random Key.mp441.12MB
4. Cipher Decryption Program/13. Runnig Code for Subsitution Cipher.mp418.17MB
4. Cipher Decryption Program/14. Hacking the Substitution Cipher.mp482.05MB
4. Cipher Decryption Program/2. Detecting English Programmatically.mp457.63MB
4. Cipher Decryption Program/3. Output of Dictionary List.mp432.11MB
4. Cipher Decryption Program/4. The Multiplicative Cipher.mp427.83MB
4. Cipher Decryption Program/5. Creating Cryptomath Module.mp419.75MB
4. Cipher Decryption Program/6. Affine Cipher Encryption.mp481.36MB
4. Cipher Decryption Program/7. Understanding the Decrypting Functionality.mp444.54MB
4. Cipher Decryption Program/8. Hacking the Affine Cipher.mp470.17MB
4. Cipher Decryption Program/9. Modifying and Hacking Affline.mp431.76MB
5. Hacking Process of Vignere Cipher/1. Concept of Vernam Cipher.mp419.96MB
5. Hacking Process of Vignere Cipher/2. Understanding the Implementation of Vernam Cipher.mp441.05MB
5. Hacking Process of Vignere Cipher/3. Implementation of Vignere Cipher.mp480.04MB
5. Hacking Process of Vignere Cipher/4. Hacking the Vignere Cipher.mp468.56MB
5. Hacking Process of Vignere Cipher/5. Base64 for Encoding and Decoding.mp433.83MB
5. Hacking Process of Vignere Cipher/6. Understanding MD5 and SHA Hashes.mp466.02MB
5. Hacking Process of Vignere Cipher/7. The XOR Type of Encryption.mp437.86MB
6. Cryptography Plugin/1. Cracking Passwords using Python.mp472.33MB
6. Cryptography Plugin/2. Understanding Cryptography Plugin.mp430.78MB
6. Cryptography Plugin/3. Learning the Pycrypto Plugin.mp433.87MB
6. Cryptography Plugin/4. Symmetric and Asymmetric Cryptography.mp4105.4MB
6. Cryptography Plugin/5. Understanding Primary Numbers Calculations.mp436.4MB
6. Cryptography Plugin/6. Rabin Miller Algorithm.mp460.27MB
6. Cryptography Plugin/7. Public Key Cryptography.mp434.3MB
6. Cryptography Plugin/8. Concept of RSA Algorithm.mp436.62MB
7. Calculating RSA keys/1. Implementation of making RSA Keys.mp443.13MB
7. Calculating RSA keys/2. Returning the Private Key for Execution.mp454.46MB
8. RSA Cipher/1. Creating RSA Algorithm Implementation.mp440.31MB
8. RSA Cipher/2. RSA Algorithm Implementation.mp448.69MB