Practical Content Encryption
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 95 | |
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/32191 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
| |
Keywords |
00:00
Content (media)EncryptionFreewareOpen sourceInternetdienstWeb pageSlide ruleSign (mathematics)XMLUMLLecture/Conference
01:24
EncryptionEncryptionSet (mathematics)Moment (mathematics)Structural loadEnde <Graphentheorie>Physical lawMittelungsverfahrenFactorizationGrand Unified TheoryHand fanComputer animationMeeting/Interview
03:09
Expert systemCryptographyIdentity managementDatabaseLöschen <Datenverarbeitung>HöheJSONXMLUMLComputer animation
05:13
Client (computing)LogicTransport Layer SecurityDatabaseElectronic data processingCommon Language InfrastructureNumber theoryPhysical lawBit error rateTelecommunicationGroup actionIdentity managementRule of inferenceProcess capability indexDecision support systemMaizePhysical lawSet (mathematics)Web pageEncryptionMittelungsverfahrenForceIP addressInternetdienstBackupDatabaseCryptographyScripting languageRoute of administrationClient (computing)Expert systemContent (media)Series (mathematics)EmailSlide ruleServer (computing)Computer animationSource codeJSON
12:55
WebsiteBoom (sailing)Hacker (term)Group actionAddress spaceComputer fileWeb browserComputer networkPlastikkarteDatabase transactionCHART <Programm>
13:52
Insertion lossPermanentDivisorRAIDContent (media)EncryptionImplementationElectronic mailing listAddress spaceEstimationInformation securityPhysical lawExpert systemData managementLatent heatIdentity managementWechselseitige InformationData storage deviceTransmitterInterior (topology)Menu (computing)Software development kitEmailBackupWritingCryptographyElectronic data processingPattern languageBackupSoftware developerDEBUG <Programm>Communications protocolExpert systemElectronic mailing listMassEncryptionComputer animation
19:05
Expert systemOperating systemApple <Marke>Computer animation
20:05
Software testingEncryptionInstallable File SystemDatabaseRow (database)MittelungsverfahrenSet (mathematics)Master KeyInstallable File SystemMobile appEncryptionHard disk driveEckeFluxPhysical quantityIP addressZugriffComputer animation
24:49
Electronic data processingDataflowManual of StyleEncryptionDeciphermentProgram flowchart
25:45
PasswordKey (cryptography)Electronic data processingDerivation (linguistics)CryptographyMaster KeyLogical constantReference dataRow (database)RSA (algorithm)AlgorithmAssociative propertyData integrityWeightHash functionNorm <Mathematik>PasswordMaster KeyDatabaseRow (database)Run time (program lifecycle phase)InferenceProcess (computing)Special markOnline chatAlgorithmScale (map)MittelungsverfahrenAbsolute valueCiphertextAdvanced Encryption StandardClefSupremumIntegrität <Informatik>Function (mathematics)Source codeHash functionProgram flowchartSource codeJSON
34:16
InternetEstimationINVESTOR <Programm>Set (mathematics)Electronic signatureGastropod shell
35:15
Computer fileoutputStreaming mediaLoginHuman migrationPasswordAlgorithmHash functionNumbering schemeCorrelation and dependenceInfinityMaizeChecklistPasswordElectronic signatureData storage deviceInterface (computing)AlgorithmEncryptionDerived set (mathematics)DatabaseSet (mathematics)Standard deviationHash functionCryptanalysisSupremumMilitary operationComputer hardware
40:21
ImplementationEncryptionRow (database)AlgorithmPlane (geometry)MittelungsverfahrenSupremumPasswordEncryptionLösung <Mathematik>BackupSalem, IllinoisDatabaseCASEntropyExpert systemChecklistInternetMaster KeyEnde <Graphentheorie>ACCESS <Programm>Inequality (mathematics)Information privacyAlgebraic closureList of anatomical isthmiZugriffGebiet <Mathematik>
45:27
Slide ruleComputer animation
46:16
ZugriffskontrolleCryptographyGUI widgetContent (media)EncryptionInfinite conjugacy class propertyTerm (mathematics)PasswordElectronic data processingData recoveryMischung <Mathematik>PasswordZugriffRow (database)Route of administrationTOUR <Programm>SupremumEnde <Graphentheorie>Process (computing)ZugriffskontrolleServer (computing)Web browserHausdorff spaceSystem administratorCASStandard deviationWordDatabasePropositional formulaClefCryptographyLengthProgrammer (hardware)Lecture/ConferenceProgram flowchart
53:56
Computer configurationDerivation (linguistics)Data recoveryFunction (mathematics)EncryptionZugriffskontrollePasswordCryptographyGUI widgetNumberUniformer RaumMittelungsverfahrenApache <Programm>Installable File SystemRoute of administrationMaster KeyOrganic computingInternetdienstZugriffRow (database)Router (computing)LoginPlattePhysical quantityRatsche <Physik>Ende <Graphentheorie>MassJSONComputer animationLecture/Conference
59:32
Service (economics)EncryptionPasswordDatabaseCorrelation and dependenceRoundingDatabaseRow (database)Hash functionLösung <Mathematik>SupremumIndexSystems <München>Lecture/Conference
01:04:53
Lecture/ConferenceComputer animation
Transcript: German(auto-generated)