Tags: Computer Programming, Cryptography, Technology & Engineering
Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISSP
CISSP
By: Louay Karadsheh
Phyiscal Security, Access Control, Operation Security ...12Decks646Flashcards18Learners -
CISSP
CISSP
By: Cort Hacker
Access Control, Vocabulary1, Vocabulary2 ...11Decks1,665Flashcards23Learners -
KCL Discrete Mathematics
KCL Discrete Mathematics
By: tyrion lannister
Arithmetic, Recurrence relation, Arithmetical Algorithms ...9Decks241Flashcards2Learners -
Comptia A+ 1102
Comptia A+ 1102
By: Jerry Garcia
Linux, Filesystems, Windows ...12Decks453Flashcards17Learners -
cybersecurity
cybersecurity
By: russell Rader
google hacks, Reconnaissance, Sniffing and Evasion ...22Decks560Flashcards23Learners -
CEH v9
CEH v9
By: Robin Nicholson
Ethics, Security, Analysis ...12Decks366Flashcards96Learners -
Security+ SY601
Security+ SY601
By: f z
1 - 1: Malware, 1 - 2: Understanding Attackers, 1 - 3: Threat Intelligence ...29Decks757Flashcards38Learners -
Information Systems Security
Information Systems Security
By: Vanessa Larivei
Intro, Cryptography, Authentication ...8Decks382Flashcards1Learner -
ag-CISA 3.0 - ISACA
ag-CISA 3.0 - ISACA
By: Anti Gondu
Domain 5 Task Statements, Chapter 5 Self Assessment 2019, Domain 5: Protection of Information Assets (Part 5A) ...43Decks1,427Flashcards9Learners -
CISSP
CISSP
By: Mark Sigsbee
2 - Telecommunications and Network Security, 3 - Access Control, 4 - Cryptography ...10Decks1,195Flashcards254Learners -
Security+
Security+
By: art art
Risk Management, Cryptography, Identity and Access Management ...16Decks552Flashcards596Learners -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra) ...21Decks1,305Flashcards3Learners -
SY0-601
SY0-601
By: Alican Demirtas
Acronyms, 2.4 Authentication and Session Management Issues, 2.4 Secure Coding Practices ...5Decks209Flashcards28Learners -
Security+ Practice exams
Security+ Practice exams
By: Alan Malone
Professor Messer Practice questions, CompTia practice questions, Comptia review questions ...38Decks2,776Flashcards165Learners -
Information Security
Information Security
By: Felix Hüneburg
Introduction, L2 - Securicy Policies, Social Engineering ...11Decks230Flashcards100Learners -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: Deanna Medina
Vocabulary/Acronyms, Ch. 12 Disaster Recovery & Incident Response, Ch. 11 Security Administration ...8Decks324Flashcards73Learners -
CEH v11 Revision
CEH v11 Revision
By: A Red
Essential Knowledge, Security in Cloud Computing, Linux ...15Decks558Flashcards32Learners -
Révisions
Révisions
By: Léo Dorn
Histoire de l'informatique, Blockchain, Cybersécu ...48Decks1,310Flashcards1Learner -
Security+
Security+
By: Thomas Reinecke
Security Overview, Malware, Malware Infections ...36Decks795Flashcards14Learners -
CSE 127: Intro to Security
CSE 127: Intro to Security
By: Lea Lacson
Lec 1: Intro, Lec 2: Security Principals, Sample Midterm Fall 2012 ...19Decks827Flashcards20Learners -
(3) CompTIA Security+ (SY0-601)
(3) CompTIA Security+ (SY0-601)
By: Maciej Węgrzynowski
Security Overview, Malware, Malware Infections ...35Decks745Flashcards18Learners -
Hacking
Hacking
By: John Norman
Linux, network services, Tools ...7Decks219Flashcards1Learner -
CEH - Certified Ethical Hacker
CEH - Certified Ethical Hacker
By: Abran Tapia
15 - SQL Injection, 16 - Hacking Wireless Networks, 17 - Hacking Mobile Platforms ...13Decks391Flashcards30Learners -
Security Plus
Security Plus
By: Josh Parker
Mastering the Basics of Security, Exploring Control Types and Methods, Understanding Basic Network Security ...19Decks555Flashcards263Learners -
My Notes of CISSP CBK
My Notes of CISSP CBK
By: Susan Bowers
Chapter 1 - Access Control, Chapter 2 - Telecommunications and Network Security, Chapter 3 - Info Sec Governance & Risk Management ...10Decks924Flashcards105Learners -
CompTIA Security+
CompTIA Security+
By: Kodama Chameleon
Threats, Attacks, And Vulnerabilities, Technologies And Tools, Architecture & Design ...6Decks697Flashcards6Learners -
Security+ Study Guide 7th Edition SY501
Security+ Study Guide 7th Edition SY501
By: Curtis Padgett
Risk Assessment & Mangement Terms (Ch. 1), Monitoring & Diagnosing Networks Terms (Ch. 2), Port Numbers ...13Decks310Flashcards107Learners -
CEH
CEH
By: Ijeoma Mowete
Hacking Wireless Networks, Cloud Computing, Malware ...8Decks258Flashcards1Learner -
SSCP
SSCP
By: Lucas Persell
Domain 1 - Access Controls, Domain 2 - Security Operations, SSCP Glossary of Terms ...8Decks1,060Flashcards63Learners -
In2120
In2120
By: Silje Marie Flaaten
General Security, Security Management, Network Security ...9Decks179Flashcards18Learners
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems