589689.xyz

Cryptography in .NET 6

  • 收录时间:2023-07-22 12:10:58
  • 文件大小:500MB
  • 下载次数:1
  • 最近下载:2023-07-22 12:10:58
  • 磁力链接:

文件列表

  1. 8. Digital Signatures/5. Demo- Adding a Digital Signature Check.mp4 62MB
  2. 4. Symmetric Encryption/09. Demo- ProtectedData.mp4 45MB
  3. 6. Hashing Algorithms/08. Demo- Adding Integrity Checks.mp4 41MB
  4. 6. Hashing Algorithms/09. Demo- Adding Integrity Checks (AES GCM Version).mp4 33MB
  5. 5. Asymmetric Encryption/8. Demo- Hybrid Encryption.mp4 26MB
  6. 4. Symmetric Encryption/07. Demo- AES GCM Mode.mp4 25MB
  7. 5. Asymmetric Encryption/6. Demo- Using the RSA Class.mp4 25MB
  8. 6. Hashing Algorithms/04. Demo- Hashing.mp4 20MB
  9. 6. Hashing Algorithms/06. Demo- Hashed Message Authentication Codes.mp4 18MB
  10. 4. Symmetric Encryption/05. Demo- Advanced Encryption Standard (AES).mp4 17MB
  11. 8. Digital Signatures/3. Demo- Implementing Digital Signatures.mp4 16MB
  12. 7. Secure Password Storage/4. Demo- RfC2898DeriveBytes.mp4 13MB
  13. 4. Symmetric Encryption/04. Advanced Encryption Standard (AES).mp4 13MB
  14. 3. Cryptographic Random Numbers/5. Demo- RandomNumberGenerator.mp4 11MB
  15. dot-net-6-cryptography.zip 8MB
  16. 7. Secure Password Storage/3. Password-based Key Derivation Functions.mp4 7MB
  17. 2. Introduction/1. Course Introduction.mp4 7MB
  18. 5. Asymmetric Encryption/7. Hybrid Encryption for the Chat Client.mp4 7MB
  19. 6. Hashing Algorithms/02. What Is Hashing-.mp4 7MB
  20. 7. Secure Password Storage/2. How Not to Store Passwords.mp4 7MB
  21. 5. Asymmetric Encryption/4. Key Derivation and Encryption.mp4 7MB
  22. 8. Digital Signatures/2. What Is a Digital Signature-.mp4 6MB
  23. 2. Introduction/2. What Is Cryptography-.mp4 5MB
  24. 5. Asymmetric Encryption/5. Using the RSA Class.mp4 5MB
  25. 4. Symmetric Encryption/03. DES and Triple DES.mp4 5MB
  26. 4. Symmetric Encryption/06. AES GCM and CCM Modes.mp4 5MB
  27. 6. Hashing Algorithms/07. Adding Integrity Checks to the Chat Example.mp4 5MB
  28. 6. Hashing Algorithms/03. MD5 and Secure Hash.mp4 4MB
  29. 8. Digital Signatures/4. Adding a Digital Signature Check to the Chat Example.mp4 4MB
  30. 4. Symmetric Encryption/08. Key Management with ProtectedData.mp4 4MB
  31. 7. Secure Password Storage/5. Summary.mp4 3MB
  32. 1. Course Overview/1. Course Overview.mp4 3MB
  33. 9. Course Summary/2. Recommended Reading List.mp4 3MB
  34. 9. Course Summary/1. Course Summary.mp4 3MB
  35. 4. Symmetric Encryption/02. What Is Symmetric Encryption-.mp4 3MB
  36. 9. Course Summary/3. Thank You.mp4 3MB
  37. 5. Asymmetric Encryption/3. Exploring RSA.mp4 2MB
  38. 6. Hashing Algorithms/05. Hashed Message Authentication Codes.mp4 2MB
  39. 5. Asymmetric Encryption/2. What Is Asymmetric Encryption-.mp4 2MB
  40. 3. Cryptographic Random Numbers/2. Why Are Random Numbers So Important-.mp4 2MB
  41. 3. Cryptographic Random Numbers/3. System.Random and Its Problems.mp4 2MB
  42. 4. Symmetric Encryption/10. Introducing the Chat Scenario.mp4 2MB
  43. 4. Symmetric Encryption/01. Overview.mp4 1MB
  44. 6. Hashing Algorithms/01. Overview.mp4 1MB
  45. 4. Symmetric Encryption/11. Summary.mp4 1MB
  46. 3. Cryptographic Random Numbers/4. Secure Random Numbers with RandomNumberGenerator.mp4 1MB
  47. 3. Cryptographic Random Numbers/1. Overview.mp4 1MB
  48. 6. Hashing Algorithms/10. Summary.mp4 1MB
  49. 5. Asymmetric Encryption/1. Overview.mp4 1MB
  50. 7. Secure Password Storage/1. Overview.mp4 1MB
  51. 3. Cryptographic Random Numbers/6. Summary.mp4 821KB
  52. 5. Asymmetric Encryption/9. Summary.mp4 816KB
  53. 8. Digital Signatures/1. Overview.mp4 812KB
  54. 8. Digital Signatures/6. Summary.mp4 549KB
  55. 8. Digital Signatures/5. Demo- Adding a Digital Signature Check.srt 19KB
  56. 4. Symmetric Encryption/04. Advanced Encryption Standard (AES).srt 14KB
  57. 4. Symmetric Encryption/09. Demo- ProtectedData.srt 14KB
  58. 6. Hashing Algorithms/08. Demo- Adding Integrity Checks.srt 14KB
  59. 6. Hashing Algorithms/09. Demo- Adding Integrity Checks (AES GCM Version).srt 11KB
  60. 5. Asymmetric Encryption/6. Demo- Using the RSA Class.srt 10KB
  61. 7. Secure Password Storage/2. How Not to Store Passwords.srt 10KB
  62. 5. Asymmetric Encryption/8. Demo- Hybrid Encryption.srt 9KB
  63. 2. Introduction/1. Course Introduction.srt 8KB
  64. 8. Digital Signatures/3. Demo- Implementing Digital Signatures.srt 8KB
  65. 3. Cryptographic Random Numbers/5. Demo- RandomNumberGenerator.srt 8KB
  66. 2. Introduction/2. What Is Cryptography-.srt 8KB
  67. 4. Symmetric Encryption/07. Demo- AES GCM Mode.srt 8KB
  68. 4. Symmetric Encryption/05. Demo- Advanced Encryption Standard (AES).srt 8KB
  69. 7. Secure Password Storage/3. Password-based Key Derivation Functions.srt 8KB
  70. 5. Asymmetric Encryption/7. Hybrid Encryption for the Chat Client.srt 8KB
  71. 6. Hashing Algorithms/02. What Is Hashing-.srt 7KB
  72. 5. Asymmetric Encryption/4. Key Derivation and Encryption.srt 7KB
  73. 8. Digital Signatures/2. What Is a Digital Signature-.srt 6KB
  74. 6. Hashing Algorithms/06. Demo- Hashed Message Authentication Codes.srt 6KB
  75. 6. Hashing Algorithms/04. Demo- Hashing.srt 6KB
  76. 4. Symmetric Encryption/03. DES and Triple DES.srt 6KB
  77. 4. Symmetric Encryption/06. AES GCM and CCM Modes.srt 6KB
  78. 7. Secure Password Storage/4. Demo- RfC2898DeriveBytes.srt 6KB
  79. 5. Asymmetric Encryption/5. Using the RSA Class.srt 6KB
  80. 6. Hashing Algorithms/07. Adding Integrity Checks to the Chat Example.srt 5KB
  81. 4. Symmetric Encryption/08. Key Management with ProtectedData.srt 5KB
  82. 8. Digital Signatures/4. Adding a Digital Signature Check to the Chat Example.srt 5KB
  83. 7. Secure Password Storage/5. Summary.srt 5KB
  84. 6. Hashing Algorithms/03. MD5 and Secure Hash.srt 4KB
  85. 9. Course Summary/1. Course Summary.srt 4KB
  86. 4. Symmetric Encryption/02. What Is Symmetric Encryption-.srt 4KB
  87. 9. Course Summary/2. Recommended Reading List.srt 3KB
  88. 1. Course Overview/1. Course Overview.srt 3KB
  89. 5. Asymmetric Encryption/3. Exploring RSA.srt 3KB
  90. 5. Asymmetric Encryption/2. What Is Asymmetric Encryption-.srt 3KB
  91. 3. Cryptographic Random Numbers/2. Why Are Random Numbers So Important-.srt 2KB
  92. 6. Hashing Algorithms/05. Hashed Message Authentication Codes.srt 2KB
  93. 9. Course Summary/3. Thank You.srt 2KB
  94. 3. Cryptographic Random Numbers/3. System.Random and Its Problems.srt 2KB
  95. 4. Symmetric Encryption/10. Introducing the Chat Scenario.srt 2KB
  96. 3. Cryptographic Random Numbers/4. Secure Random Numbers with RandomNumberGenerator.srt 2KB
  97. 6. Hashing Algorithms/01. Overview.srt 2KB
  98. 3. Cryptographic Random Numbers/1. Overview.srt 1KB
  99. 4. Symmetric Encryption/01. Overview.srt 1KB
  100. 6. Hashing Algorithms/10. Summary.srt 1KB
  101. 4. Symmetric Encryption/11. Summary.srt 1KB
  102. 5. Asymmetric Encryption/1. Overview.srt 1KB
  103. 7. Secure Password Storage/1. Overview.srt 1KB
  104. 3. Cryptographic Random Numbers/6. Summary.srt 1KB
  105. 8. Digital Signatures/1. Overview.srt 835B
  106. 8. Digital Signatures/6. Summary.srt 779B
  107. 5. Asymmetric Encryption/9. Summary.srt 762B