Tags: Computer Programming, Cryptography, Technology & Engineering
Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems ...11Decks127Flashcards26Learners -
CSBC Discord S+
CSBC Discord S+
By: Dane Andreasen
Networking Basics and Terminology (1), Networking Basics and Terminology (2), Introduction to Security Terminology ...26Decks658Flashcards35Learners -
CyberSecurity
CyberSecurity
By: Rakim Allah
Chapter 11, Chapter 12, Chapter 13 ...21Decks831Flashcards127Learners -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats ...16Decks226Flashcards1Learner -
Sécurité informatique
Sécurité informatique
By: Charlie de Lanauze
Chapitre 1 : Histoire des codes secrets, Chapitre 2 : La confidentialité dans un système de cryptographie à clés privées, Chapitre 3 : L'intégrité à partir de clés secrètes ...6Decks70Flashcards1Learner -
CS6035 IIS
CS6035 IIS
By: Carol Cheung
Cryptography Intro, Symmetric Encryption, Public Key Cryptography ...8Decks90Flashcards6Learners -
Living in the IT Era
Living in the IT Era
By: Jan Wilhelm Sy
Chapter 0: Introduction to LITE, Chapter 2: Computer COmponents, Chapter 2.1: Computer Components P2 ...5Decks160Flashcards1Learner -
Computer Security
Computer Security
By: Pall Magnusson
Computer security and malware, Network security, Operating system security ...7Decks73Flashcards1Learner -
Sec
Sec
By: Gian Carlo Francisco
Quiz 1, Quiz 2, L4 - Operating System Security ...18Decks310Flashcards12Learners -
CSCI 4130 - Intro to Cybersecurity
CSCI 4130 - Intro to Cybersecurity
By: Kelly Wei
Security Principles, Control Hijacking - Attacks, Control Hijacking - Defenses ...11Decks437Flashcards2Learners -
CISSP Study
CISSP Study
By: Logan Ninefingers
Security and Risk Management, Asset Security, Security Engineering ...13Decks572Flashcards6Learners -
Security+ Concepts
Security+ Concepts
By: erik hogberg
Cryptography & PKI, Network & Protocols, Threats, Attacks & Vulnerabilities ...9Decks393Flashcards1Learner -
COMP 156 Computer Concepts
COMP 156 Computer Concepts
By: G M
What's In A Computer? (Week 2), Binary + Representation of Info (Week 3), Hexidecimal, CPU, and the Toy Computer (Week 4) ...12Decks381Flashcards34Learners -
Security Plus
Security Plus
By: Caleb Stewart
Ch1, Ch2: Identity and Access Management, Ch3: Exploring Network Technologies and Tools ...12Decks507Flashcards17Learners -
Pat's SCOR 350-701 Deck
Pat's SCOR 350-701 Deck
By: Patrick Cirillo
Security Concepts - CyberSecurity Fundamentals, Infrastructure Security, Security Concepts - Cryptography ...11Decks529Flashcards2Learners -
Comptia Security + SYO-701
Comptia Security + SYO-701
By: Kerry Gambrel
Chapter 1 Risk Management, Chapter 2 Foundations of Cryptography, Chapter 3 Physical Security ...8Decks842Flashcards7Learners -
Part II
Part II
By: Steven Mai
Linear Analysis, Rep Theory, Galois Theory ...8Decks193Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure ...12Decks292Flashcards51Learners -
CompTIA Security+ SYO-501
CompTIA Security+ SYO-501
By: Brittany Nicole
Practice Exam 1, Chapter 1: Mastering Security Basics, Chapter 2: Understanding Identity and Access Management ...13Decks1,089Flashcards24Learners -
Information Security
Information Security
By: Akila Weeratunga
Introduction, Intro to Cryptography, Hash functions and MAC ...6Decks55Flashcards4Learners -
IT Security: Defense against the Digital Dark Arts
IT Security: Defense against the Digital Dark Arts
By: Kendog TV
Week 1 - Other Attacks, Week 2 - Symmetric Encryption, Week 2 - Public Ker or Asymmetric Encryption ...5Decks116Flashcards1Learner -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
cissp-ac
cissp-ac
By: Al Colon
Al's Cissp, Fires, Calculations ...15Decks158Flashcards15Learners -
csc2031
csc2031
By: Alex Freeman
Security Basics, Input Threats & Validation, Handling errors ...17Decks188Flashcards5Learners -
Network Security
Network Security
By: Kimani Kelly
Introduction to Security, Pervasive Attack Surfaces and Controls, Fundamentals of Cryptography3Decks39Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Joe Park
Ch.1 Todays Security Professional, Ch.2 Cybersecurity Threat Landscape, Ch.3 Malicious Code ...7Decks196Flashcards1Learner -
SSCP
SSCP
By: Maria Smith
2. Understand Security Concepts, 1. ISC2 Code Of Ethics, Vocabulary ...11Decks489Flashcards1Learner -
Auria
Auria
By: Joseph Callaghan
Interview, Ports, Cryptography ...7Decks145Flashcards1Learner -
Mykes Notes
Mykes Notes
By: Okoye Michael
Crafting Interpreters, Reading Research Papers, Rust Language ...8Decks131Flashcards2Learners -
CS111 InfoSec
CS111 InfoSec
By: Thomas Collins
Lectures up to 9/2, Public Key Cryptography, Lecture 6 - Risk ...5Decks76Flashcards1Learner
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems
-
Technology Certifications