Cryptography in .NET 6 收录时间:2023-07-22 12:10:58 文件大小:500MB 下载次数:1 最近下载:2023-07-22 12:10:58 磁力链接: magnet:?xt=urn:btih:830b8e71a9184ebd65dde9aac7a31e52b982f25d 立即下载 复制链接 文件列表 8. Digital Signatures/5. Demo- Adding a Digital Signature Check.mp4 62MB 4. Symmetric Encryption/09. Demo- ProtectedData.mp4 45MB 6. Hashing Algorithms/08. Demo- Adding Integrity Checks.mp4 41MB 6. Hashing Algorithms/09. Demo- Adding Integrity Checks (AES GCM Version).mp4 33MB 5. Asymmetric Encryption/8. Demo- Hybrid Encryption.mp4 26MB 4. Symmetric Encryption/07. Demo- AES GCM Mode.mp4 25MB 5. Asymmetric Encryption/6. Demo- Using the RSA Class.mp4 25MB 6. Hashing Algorithms/04. Demo- Hashing.mp4 20MB 6. Hashing Algorithms/06. Demo- Hashed Message Authentication Codes.mp4 18MB 4. Symmetric Encryption/05. Demo- Advanced Encryption Standard (AES).mp4 17MB 8. Digital Signatures/3. Demo- Implementing Digital Signatures.mp4 16MB 7. Secure Password Storage/4. Demo- RfC2898DeriveBytes.mp4 13MB 4. Symmetric Encryption/04. Advanced Encryption Standard (AES).mp4 13MB 3. Cryptographic Random Numbers/5. Demo- RandomNumberGenerator.mp4 11MB dot-net-6-cryptography.zip 8MB 7. Secure Password Storage/3. Password-based Key Derivation Functions.mp4 7MB 2. Introduction/1. Course Introduction.mp4 7MB 5. Asymmetric Encryption/7. Hybrid Encryption for the Chat Client.mp4 7MB 6. Hashing Algorithms/02. What Is Hashing-.mp4 7MB 7. Secure Password Storage/2. How Not to Store Passwords.mp4 7MB 5. Asymmetric Encryption/4. Key Derivation and Encryption.mp4 7MB 8. Digital Signatures/2. What Is a Digital Signature-.mp4 6MB 2. Introduction/2. What Is Cryptography-.mp4 5MB 5. Asymmetric Encryption/5. Using the RSA Class.mp4 5MB 4. Symmetric Encryption/03. DES and Triple DES.mp4 5MB 4. Symmetric Encryption/06. AES GCM and CCM Modes.mp4 5MB 6. Hashing Algorithms/07. Adding Integrity Checks to the Chat Example.mp4 5MB 6. Hashing Algorithms/03. MD5 and Secure Hash.mp4 4MB 8. Digital Signatures/4. Adding a Digital Signature Check to the Chat Example.mp4 4MB 4. Symmetric Encryption/08. Key Management with ProtectedData.mp4 4MB 7. Secure Password Storage/5. Summary.mp4 3MB 1. Course Overview/1. Course Overview.mp4 3MB 9. Course Summary/2. Recommended Reading List.mp4 3MB 9. Course Summary/1. Course Summary.mp4 3MB 4. Symmetric Encryption/02. What Is Symmetric Encryption-.mp4 3MB 9. Course Summary/3. Thank You.mp4 3MB 5. Asymmetric Encryption/3. Exploring RSA.mp4 2MB 6. Hashing Algorithms/05. Hashed Message Authentication Codes.mp4 2MB 5. Asymmetric Encryption/2. What Is Asymmetric Encryption-.mp4 2MB 3. Cryptographic Random Numbers/2. Why Are Random Numbers So Important-.mp4 2MB 3. Cryptographic Random Numbers/3. System.Random and Its Problems.mp4 2MB 4. Symmetric Encryption/10. Introducing the Chat Scenario.mp4 2MB 4. Symmetric Encryption/01. Overview.mp4 1MB 6. Hashing Algorithms/01. Overview.mp4 1MB 4. Symmetric Encryption/11. Summary.mp4 1MB 3. Cryptographic Random Numbers/4. Secure Random Numbers with RandomNumberGenerator.mp4 1MB 3. Cryptographic Random Numbers/1. Overview.mp4 1MB 6. Hashing Algorithms/10. Summary.mp4 1MB 5. Asymmetric Encryption/1. Overview.mp4 1MB 7. Secure Password Storage/1. Overview.mp4 1MB 3. Cryptographic Random Numbers/6. Summary.mp4 821KB 5. Asymmetric Encryption/9. Summary.mp4 816KB 8. Digital Signatures/1. Overview.mp4 812KB 8. Digital Signatures/6. Summary.mp4 549KB 8. Digital Signatures/5. Demo- Adding a Digital Signature Check.srt 19KB 4. Symmetric Encryption/04. Advanced Encryption Standard (AES).srt 14KB 4. Symmetric Encryption/09. Demo- ProtectedData.srt 14KB 6. Hashing Algorithms/08. Demo- Adding Integrity Checks.srt 14KB 6. Hashing Algorithms/09. Demo- Adding Integrity Checks (AES GCM Version).srt 11KB 5. Asymmetric Encryption/6. Demo- Using the RSA Class.srt 10KB 7. Secure Password Storage/2. How Not to Store Passwords.srt 10KB 5. Asymmetric Encryption/8. Demo- Hybrid Encryption.srt 9KB 2. Introduction/1. Course Introduction.srt 8KB 8. Digital Signatures/3. Demo- Implementing Digital Signatures.srt 8KB 3. Cryptographic Random Numbers/5. Demo- RandomNumberGenerator.srt 8KB 2. Introduction/2. What Is Cryptography-.srt 8KB 4. Symmetric Encryption/07. Demo- AES GCM Mode.srt 8KB 4. Symmetric Encryption/05. Demo- Advanced Encryption Standard (AES).srt 8KB 7. Secure Password Storage/3. Password-based Key Derivation Functions.srt 8KB 5. Asymmetric Encryption/7. Hybrid Encryption for the Chat Client.srt 8KB 6. Hashing Algorithms/02. What Is Hashing-.srt 7KB 5. Asymmetric Encryption/4. Key Derivation and Encryption.srt 7KB 8. Digital Signatures/2. What Is a Digital Signature-.srt 6KB 6. Hashing Algorithms/06. Demo- Hashed Message Authentication Codes.srt 6KB 6. Hashing Algorithms/04. Demo- Hashing.srt 6KB 4. Symmetric Encryption/03. DES and Triple DES.srt 6KB 4. Symmetric Encryption/06. AES GCM and CCM Modes.srt 6KB 7. Secure Password Storage/4. Demo- RfC2898DeriveBytes.srt 6KB 5. Asymmetric Encryption/5. Using the RSA Class.srt 6KB 6. Hashing Algorithms/07. Adding Integrity Checks to the Chat Example.srt 5KB 4. Symmetric Encryption/08. Key Management with ProtectedData.srt 5KB 8. Digital Signatures/4. Adding a Digital Signature Check to the Chat Example.srt 5KB 7. Secure Password Storage/5. Summary.srt 5KB 6. Hashing Algorithms/03. MD5 and Secure Hash.srt 4KB 9. Course Summary/1. Course Summary.srt 4KB 4. Symmetric Encryption/02. What Is Symmetric Encryption-.srt 4KB 9. Course Summary/2. Recommended Reading List.srt 3KB 1. Course Overview/1. Course Overview.srt 3KB 5. Asymmetric Encryption/3. Exploring RSA.srt 3KB 5. Asymmetric Encryption/2. What Is Asymmetric Encryption-.srt 3KB 3. Cryptographic Random Numbers/2. Why Are Random Numbers So Important-.srt 2KB 6. Hashing Algorithms/05. Hashed Message Authentication Codes.srt 2KB 9. Course Summary/3. Thank You.srt 2KB 3. Cryptographic Random Numbers/3. System.Random and Its Problems.srt 2KB 4. Symmetric Encryption/10. Introducing the Chat Scenario.srt 2KB 3. Cryptographic Random Numbers/4. Secure Random Numbers with RandomNumberGenerator.srt 2KB 6. Hashing Algorithms/01. Overview.srt 2KB 3. Cryptographic Random Numbers/1. Overview.srt 1KB 4. Symmetric Encryption/01. Overview.srt 1KB 6. Hashing Algorithms/10. Summary.srt 1KB 4. Symmetric Encryption/11. Summary.srt 1KB 5. Asymmetric Encryption/1. Overview.srt 1KB 7. Secure Password Storage/1. Overview.srt 1KB 3. Cryptographic Random Numbers/6. Summary.srt 1KB 8. Digital Signatures/1. Overview.srt 835B 8. Digital Signatures/6. Summary.srt 779B 5. Asymmetric Encryption/9. Summary.srt 762B