Learn Digital Signature
Study Digital Signature using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISA - Doshi : Domain 5
CISA - Doshi : Domain 5
By: Makponse Yamonche
1- Wireless WiFi Security, 2.Firewall Types & Implementation, 2.1 : Quiz Firewall17Decks291Flashcards48Learners -
CISA 3.0 - ISACA
CISA 3.0 - ISACA
By: Host Mom
Domain 5 Task Statements, Chapter 5 Self Assessment 2019, Domain 5: Protection of Information Assets (Part 5A)43Decks1,427Flashcards137Learners -
Thor Teaches CISSP
Thor Teaches CISSP
By: Sad Summertron
Cryptography, Hashing, Attacks on Cryptography, Hashing, Digital Signatures3Decks112Flashcards24Learners -
CS4203: Computer Security
CS4203: Computer Security
By: Seamus Bonner
Introduction, Cryptography, Hashing19Decks522Flashcards13Learners -
ag-CISA 3.0 - ISACA
ag-CISA 3.0 - ISACA
By: Anti Gondu
Domain 5 Task Statements, Chapter 5 Self Assessment 2019, Domain 5: Protection of Information Assets (Part 5A)43Decks1,427Flashcards5Learners -
CSC-318 Cryptography and IT-Security
CSC-318 Cryptography and IT-Security
By: Alexander Balfour
Ciphers, Access Control-Passwords, Access Control Policies and Mechanisms13Decks189Flashcards1Learner -
Network investigations - COMP40110
Network investigations - COMP40110
By: Jason Abbott
OSI model, Server room equipment, IPV4 and IPV620Decks347Flashcards15Learners -
zzz UNIT-2
zzz UNIT-2
By: Peaceful Soul
Indian Contract Act 1872, Tender System Of Purchase, PM purchase policy8Decks141Flashcards2Learners -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats16Decks226Flashcards1Learner -
csc2031
csc2031
By: Alex Freeman
Security Basics, Input Threats & Validation, Handling errors17Decks188Flashcards5Learners -
Cryptography
Cryptography
By: Arpita Khare
Lecture 1, Lecture 2 - Stream Ciphers, Lecture 3 - Block Ciphers, DES14Decks237Flashcards27Learners -
AQA A Level Computer Science
AQA A Level Computer Science
By: Alex Parker
X) TCP / IP / Client-server Model, X) Input/ Output and secondary storage devices + ( Hardware & Software), 2) Boolean Algebra and Logic Gates13Decks249Flashcards39Learners -
Computer Security
Computer Security
By: Ben Shef
1. Network security: Networking Principles, 2. Network security: ARP, TCP/IP and its vulnerabilities, 3. Cryptography: introduction18Decks267Flashcards26Learners -
CRYPTOGRAPHY
CRYPTOGRAPHY
By: Smashing Gaming vulture
symmetric ciphers (week 3), asymmetric ciphers (week 4), MAC, HMAC & DigitalSignature (week 5)3Decks97Flashcards1Learner -
Network Security
Network Security
By: Aleysha Mullen
Review of Networking Concepts, Introduction to Network Security, Denial of Service and Social Engineering10Decks174Flashcards8Learners -
Security Engineering
Security Engineering
By: Adina G
Introduction to Security, Symmetry Key Encryption, AES, Public Key Encryption10Decks208Flashcards1Learner -
CSC3631 Symmetric Cryptography
CSC3631 Symmetric Cryptography
By: Harsh Makhija
Intro, Actual Intro, Block Ciphers7Decks70Flashcards2Learners -
Cryptography
Cryptography
By: E Mi
Introduction, Number theory, groups and finite fields, Classical encryption15Decks563Flashcards1Learner -
CryptoGraphy
CryptoGraphy
By: Josh Davidson
1 - Intro, 1 - Classical Symmetric Algorithms, 2 - Stream Ciphers19Decks224Flashcards1Learner -
BofA
BofA
By: Ryan Welsh
Life Plan and Targeted Offers, International Wires, Credit24Decks374Flashcards1Learner -
CISSP Domain 3
CISSP Domain 3
By: Maximilian Ernst
Types of Ciphers, Zero-Knowledge Proof, Split Knowlege16Decks95Flashcards10Learners -
'i lOvE cRypTo'
'i lOvE cRypTo'
By: sev unal
Week 1 Part 1, Week 2 Part 1, Week 3 Part 112Decks223Flashcards1Learner -
Computer Security
Computer Security
By: Jason Swift
CIA Triad and Access Control, Introduction to Encryption, Symmetric Encryption Introduction19Decks191Flashcards1Learner -
Cryptology
Cryptology
By: Terje Dahl
Classical and information theory, Streamciphers, Block-ciphers5Decks57Flashcards3Learners -
INFO3002
INFO3002
By: Mukelwe Mdluli
Data Warehousing, DW Environment, Business Intelligence & Performance Dashboards15Decks137Flashcards1Learner -
Rattrapage ICN
Rattrapage ICN
By: Ines Pinton
Syteme et gestion de fichiers, Numerisation cyber-criminalite et hygiene de vie numerique, Rapport OSAC30Decks251Flashcards2Learners -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra)21Decks1,305Flashcards3Learners -
Blockchain Based Systems Engineering
Blockchain Based Systems Engineering
By: Kaushik Purahoo
3.1 Intro to bitcoin / Bitcoin Architecture, 3.3 Transactions in Bitcoin, 3.4 Bitcoin Network33Decks238Flashcards1Learner -
Security Comp TIA 701
Security Comp TIA 701
By: Dominic Asio
Security Controls 1.1, THE CIA/AIC Triad 1.2, Non-Repudiation 1.232Decks284Flashcards1Learner -
Ciphers and Fundamentals
Ciphers and Fundamentals
By: Bob Jones
Lecture Notes, Lecture 2 - Secret Key Encryption, Lecture 2 - Secret Key Encryption - Block Cipher Modes8Decks90Flashcards1Learner