Sneaking In Network Security
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 165 | |
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/39215 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
| |
Keywords |
00:00
InformationComputer networkComputer networkMaxima and minimaInformation securitySoftwareMusical ensembleSoftware testingRoundness (object)NeuroinformatikLecture/Conference
00:54
Information securitySoftwareQuicksortProjective planeMultiplication signProcess modelingScaling (geometry)TheoryInformation securityGoodness of fitIntegrated development environmentXMLUMLLecture/ConferenceMeeting/Interview
01:55
Gastropod shellSoftwareGame controllerPivot elementCuboidPatch (Unix)Server (computing)NP-hardIncidence algebraGastropod shellComputer architecture1 (number)Time zoneInternetworkingDependent and independent variablesQuicksortInformation securityPerimeterLocal ring
03:16
Vertex (graph theory)Service (economics)MathematicsJordan-NormalformMathematicsData managementScaling (geometry)CodeQuicksortSoftware developerInstance (computer science)Product (business)Projective planeComputer architectureService (economics)Complex (psychology)Time zoneSoftwareComputer animation
04:34
Computer networkTheoryProcess modelingInformation securityProcess (computing)SoftwareCategory of beingRight angleSoftware developerSoftwareTheoryInformation securityCartesian coordinate systemSoftware testingProcess modelingXMLComputer animation
05:25
TheoryInformation securityComputer networkSicHoaxCommunications protocolCartesian coordinate systemSelf-organizationMultiplication signInformation securityData managementTerm (mathematics)Physical systemCommunications protocolSoftwareDefault (computer science)Scaling (geometry)Software engineeringRight angleSoftware developerService (economics)QuicksortSoftware testingProduct (business)BuildingDecision theorySlide rulePlastikkarteData centerGroup actionField (computer science)Operator (mathematics)Goodness of fitProjective planeConfiguration spaceINTEGRALComputer animation
08:05
Wechselseitige InformationAuthenticationElectronic mailing listInformation securityPolygon meshImplementationIdentity managementVertex (graph theory)Service (economics)Bound stateComputer networkQuicksortPhysical systemInformation securityTelecommunicationConfiguration spaceAuthenticationSlide ruleService (economics)MereologyTransport Layer SecurityIdentity managementIP addressCategory of beingCommunications protocolSoftwareIntelligent NetworkProcess modelingMobile appXMLComputer animation
09:29
Identity managementBound stateAuthorizationService (economics)Vertex (graph theory)ImplementationRule of inferenceComputer networkAsynchronous Transfer ModeSoftwareService (economics)Level (video gaming)Connected spaceAuthorizationTransport Layer SecurityLogicQuicksortCentralizer and normalizerDiagramPublic key certificateView (database)Wind tunnelComputer animationProgram flowchart
10:23
Client (computing)Service (economics)RippingMeta elementImplementationWind tunnelService (economics)Server (computing)Direct numerical simulationClient (computing)AuthenticationSoftwarePhysical systemWeb pagePoint cloudQuicksortPublic key certificateWeb 2.0Term (mathematics)Integrated development environmentCore dumpInformation securityDirection (geometry)Domain nameIdentity managementLevel (video gaming)Key (cryptography)Service-oriented architectureSoftware frameworkProduct (business)Internet service providerMultiplication signTransport Layer SecurityExtension (kinesiology)Formal verificationWeb browserProjective planeExterior algebraWechselseitige InformationPlastikkarteStack (abstract data type)Public domainCuboidSound effectComputer animationProgram flowchart
13:28
Stack (abstract data type)PlastikkarteElectronic mailing listOpen sourceSlide ruleOrder (biology)Local ringSystem callProxy serverService (economics)Physical systemPlastikkarteAddress spaceInstance (computer science)Information securityStack (abstract data type)Projective plane
14:49
Service (economics)Service (economics)Reverse engineeringLine (geometry)Process modelingInformation securityProxy serverInternetworkingTelecommunicationTransport Layer Security
15:52
Service (economics)Metric systemInformation securityFormal verificationGame controllerProxy serverTransport Layer SecurityService (economics)Presentation of a groupAuthenticationFormal languageQuicksortSoftware testingSlide ruleDifferent (Kate Ryan album)TelecommunicationCodeCommunications protocolAuthorizationConsistencyDirection (geometry)Software frameworkMetric systemStructural loadComputer animation
17:16
Point cloudNon-standard analysisElectric currentGoogolClient (computing)Proxy serverService (economics)Arrow of timeCloud computingMultiplication signProxy serverService (economics)Information securityTransport Layer SecurityAuthenticationBitCodeMechanism designExclusive orSoftware frameworkComputer animationJSON
18:28
Keyboard shortcutLink (knot theory)TorusIdentity managementFormal verificationRight anglePublic key certificateConfiguration spaceDecision theoryTelecommunicationLevel (video gaming)Web pageDynamical systemFront and back endsCAN busQuicksortSoftwareTime zoneService (economics)RobotComputer animationProgram flowchart
20:05
Identity managementTelecommunicationPublic key certificateTerm (mathematics)Vertex (graph theory)MathematicsClefAuthorizationBuildingService (economics)Service (economics)Fluid staticsIdentity managementQuicksortElectronic mailing listMultitier architecturePublic key certificateSpreadsheetFigurate numberConfiguration spaceExterior algebraBitDistribution (mathematics)Physical systemAttribute grammarIdentical particlesTransport Layer SecuritySoftwareTime zonePoint cloudSet (mathematics)TelecommunicationSelectivity (electronic)Proxy serverState of matterLevel (video gaming)Data managementInstance (computer science)MathematicsSystem administratorFront and back endsString (computer science)CASE <Informatik>Functional (mathematics)Computer animation
23:26
Level (video gaming)LogicBuildingInferenceCodeRegulärer Ausdruck <Textverarbeitung>DiagramInformation securitySoftwareSoftware repositoryQuicksortPoint (geometry)Data managementCodeFirewall (computing)Self-organizationConfiguration spaceMaxima and minimaPresentation of a groupTelecommunicationElectronic mailing listDecision theoryMusical ensemblePhysical systemMultiplication signMathematicsMoving averageSinc functionWeb 2.0Latent heatCASE <Informatik>Computer fileNeuroinformatikImplementationComputer animationProgram flowchart
25:11
InferenceService (economics)Configuration spaceData managementPhysical systemDatabaseCache (computing)Software repositoryVirtual machineSoftwareProduct (business)InformationLevel (video gaming)Repository (publishing)Peer-to-peer
26:04
Software repositoryWorld Wide Web ConsortiumMathematicsSoftwareService (economics)Identity managementRepository (publishing)NeuroinformatikBitVapor barrierLevel (video gaming)Web crawlerReverse engineeringConnected spaceWeb 2.0QuicksortSingle-precision floating-point formatInformation securityGame controllerDecision theoryAdditionPhysical systemPoint (geometry)Proxy serverOrder (biology)AuthorizationBoilerplate (text)Peer-to-peerDistribution (mathematics)Condition numberUniform resource locatorCASE <Informatik>Computer animation
28:03
Client (computing)AuthorizationProxy serverInformationService (economics)LogicAuthenticationEmailZugriffskontrolleIdentity managementElectronic mailing listTransport Layer SecurityAuthorizationToken ringKey (cryptography)Component-based software engineeringOrder (biology)Software developerSystem callConfiguration spacePasswordGame controllerQuicksortStreaming mediaCryptographyPhysical systemCommunications protocolReverse engineeringTelecommunicationMobile appProxy serverIdentity managementLevel (video gaming)Electronic mailing listPublic key certificateCategory of beingClient (computing)Information securityInformationService (economics)EmailImplementationDecision theory1 (number)JSONXML
29:39
FreewareBand matrixVertex (graph theory)Reverse engineeringKolmogorov complexitySoftwareService (economics)Public key certificateSound effectSoftwareRevision controlService (economics)Information securityElectronic mailing listDependent and independent variablesPhysical systemLevel (video gaming)TelecommunicationSubsetWeb 2.0DebuggerComputer networkIdentity managementQuicksortTransport Layer SecurityCore dumpElement (mathematics)Server (computing)Proxy serverTerm (mathematics)AuthenticationCuboidPublic key certificateMathematicsState of matterConnected spaceCache (computing)2 (number)Band matrixBitCentralizer and normalizerDataflowFirewall (computing)AdditionFront and back endsXMLComputer animation
32:46
Component-based software engineeringProxy serverStorage area networkIdentity managementPublic key certificateScripting languageSoftware repositoryAuthorizationTopologyFunction (mathematics)Cache (computing)Installation artFormal verificationService (economics)Configuration spacePhysical systemLocal ringProcess (computing)QuicksortSoftware testingConfidence intervalLocal ringExistencePerspective (visual)Arithmetic meanAxiom of choiceComputer fileOpen sourceProduct (business)Network topologyParsingCondition numberMultiplication signStructural loadAuthorizationService (economics)Web 2.0AuthenticationStress (mechanics)MathematicsFunction (mathematics)Variety (linguistics)Information securityCartesian coordinate systemScripting languageCache (computing)1 (number)Software repositoryConfiguration spacePhysical systemGoodness of fitProjective planeMoving averagePlanningRoutingPublic key certificateLatent heatSoftwareWind tunnelIdentity managementProxy serverComponent-based software engineeringPolygon meshMetric systemRollback (data management)Transport Layer SecurityUltraviolet photoelectron spectroscopyRepresentation (politics)Rule of inferenceOperator (mathematics)Sound effectElectronic mailing listPoint (geometry)MiniDiscSystem callMappingLevel (video gaming)UMLComputer animationXML
39:33
LogicAuthorizationPhysical systemService (economics)Socket-SchnittstelleProxy serverClient (computing)Sound effectSoftware testingProcess (computing)Configuration spaceLocal ringIntegrated development environmentPersonal digital assistantCache (computing)LogicAuthorizationPublic key certificateLevel (video gaming)Proxy serverReverse engineeringVisualization (computer graphics)Computer hardwareService (economics)Revision controlPasswordMetric systemBitEncryptionConfiguration managementConfiguration spaceInformation securityCartesian coordinate systemConnected spaceNumberState observerWechselseitige InformationAxiom of choiceMobile appProcess (computing)QuicksortTransport Layer SecurityIdentity managementMassBit rateCASE <Informatik>Patch (Unix)MathematicsCategory of beingCache (computing)SoftwareCuboidSweep line algorithmArithmetic meanSoftware testingStability theoryProjective planeMultiplication signMoving averageOrder (biology)Semiconductor memoryGoodness of fitEmailState of matterPhysical systemNetwork topologyNumbering schemeSensitivity analysisProgram flowchartXMLComputer animation
46:23
Distribution (mathematics)TelecommunicationVertex (graph theory)Identity managementComputer networkElectronic mailing listZugriffskontrolleConfiguration spaceComputer configurationSoftware frameworkInformation securityMereologySoftwareScaling (geometry)Goodness of fitQuicksortVideo game consoleConfiguration managementPhysical systemAuthorizationConfiguration spaceService (economics)Electric generatorPublic key certificateCASE <Informatik>Polygon meshInformation securityProjective planeInstance (computer science)Time zoneConnected spaceGame controllerInjektivitätTelecommunicationElectronic mailing listProxy serverStrategy gameComputer configurationSummierbarkeitMathematicsMappingSystem callIdentity managementIntegrated development environmentDataflowRobotTransport Layer SecurityComputer animation
50:17
TwitterConnected spaceMaxima and minimaSheaf (mathematics)VideoconferencingTwitterMusical ensembleLine (geometry)Goodness of fitStack (abstract data type)QuicksortComputer virusCellular automatonXMLLecture/Conference
51:41
NumberLocal ringMathematical analysisAreaCodeMobile appLecture/ConferenceMeeting/Interview
52:28
NumberWorkstation <Musikinstrument>Service (economics)SoftwareIdentity managementCore dumpQuicksortMoment (mathematics)Proxy serverVirtual machineComputer architectureComputer animationLecture/Conference
53:17
Proxy serverCodeClosed setNumberOperator (mathematics)ImplementationFormal verificationElectric generatorScripting languageLevel (video gaming)Heat transferReverse engineeringQuicksortAreaOrder (biology)AuthorizationSoftwareNetwork topologySingle-precision floating-point formatMathematicsSynchronizationLecture/Conference
54:33
NumberPoint (geometry)Electronic mailing listQuicksortPublic key certificateBit rateProcess (computing)Electric generatorTerm (mathematics)Renewal theoryArmLevel (video gaming)AuthorizationLecture/Conference
55:47
SoftwareVideo gameWeb pageFirewall (computing)Process capability indexView (database)Physical systemIntegrated development environmentFlow separationProduct (business)InformationArithmetic meanLatent heatPublic key certificateMultiplication signGame controllerLecture/Conference
56:55
Data managementMathematicsObject (grammar)Cartesian coordinate systemCoefficient of determinationGroup actionAddress spaceUsabilityProduct (business)Information securityTransport Layer SecuritySoftware developerPlanningSelf-organizationSoftware testingMultiplication signTerm (mathematics)ImplementationStack (abstract data type)AuthenticationOperator (mathematics)Lecture/Conference
58:39
Stack (abstract data type)Web 2.0Computer file2 (number)SynchronizationConfiguration spaceElectronic mailing listIdentity managementMetadataClient (computing)InformationLevel (video gaming)Entire functionSoftwareLecture/Conference
59:41
QuicksortSinc functionComputer fileWeb 2.0Service (economics)Multiplication signInformationMoment (mathematics)Mechanism designLecture/Conference
01:00:28
Semiconductor memoryCartesian closed category
Transcript: English(auto-generated)