Tags: Computer Programming, Cryptography, Technology & Engineering
Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Information Assurance and Security 2
Information Assurance and Security 2
By: Alex Reyes
Module 1: Security Technology: Firewall and VPN, Module 2: Security Technology: Intrusion Detection and Prevention Systems, Module 3: Cryptography3Decks183Flashcards1Learner -
Security+
Security+
By: Richard Romick
Chapter 3: Cryptography, Common Ports, Chapter 4: Network Connectivity ...9Decks388Flashcards1Learner -
Cybersecurity Architecture & Engineering - D488
Cybersecurity Architecture & Engineering - D488
By: Paul Wartenberg
Section 1 - Secure Architecture for GRC, Section 2 - Secure Network Architecture, Section 3 - Security Engineering & Cryptography ...4Decks251Flashcards9Learners -
CyberSecurity
CyberSecurity
By: Rakim Allah
Chapter 11, Chapter 12, Chapter 13 ...21Decks831Flashcards126Learners -
CISSP - Certified Information Systems Security Professional
CISSP - Certified Information Systems Security Professional
By: Abran Tapia
1 - Security Governance, 2 - Personnel Security and Risk Management, 3 - Business Continuity Planning ...20Decks504Flashcards128Learners -
Introduction to IT Security
Introduction to IT Security
By: Mathias Unknown
Goals and Principles - What Is Security, Goals and Principles - Privacy, Goals and Principles - Design Principles for Secure Systems ...11Decks127Flashcards26Learners -
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
By: Alex valentine
Networking Basics and Terminology, Introduction to Security Terminology, Security Policies and Standards ...20Decks695Flashcards7Learners -
DNS and DNSSEC
DNS and DNSSEC
By: Gaetan Njinang
Cryptography And DNSSEC, DNS2Decks17Flashcards2Learners -
computer science
computer science
By: Henna Hussain
python, cryptography, binary3Decks28Flashcards1Learner -
CS110 (discrete) 7:30-9am m-tue
CS110 (discrete) 7:30-9am m-tue
By: NOVY MAR QUILLOSA
Graph Theory in Discrete Mathematics, Number Theory in Discrete Mathematics, Probability and Statistics in Computing ...4Decks47Flashcards1Learner -
Security+ Concepts
Security+ Concepts
By: erik hogberg
Cryptography & PKI, Network & Protocols, Threats, Attacks & Vulnerabilities ...9Decks393Flashcards1Learner -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats ...16Decks226Flashcards1Learner -
Sec
Sec
By: Gian Carlo Francisco
Quiz 1, Quiz 2, L4 - Operating System Security ...18Decks310Flashcards12Learners -
Computer Security
Computer Security
By: Pall Magnusson
Computer security and malware, Network security, Operating system security ...7Decks73Flashcards1Learner -
CISSP Study
CISSP Study
By: Logan Ninefingers
Security and Risk Management, Asset Security, Security Engineering ...13Decks572Flashcards6Learners -
Security + 601
Security + 601
By: Piotr Czajkowski
Security standards organizations, Security documentation, Cryptography ...4Decks41Flashcards2Learners -
Security+
Security+
By: Karin Mayville
Acronyms, 1 - Today's Security Professional, 2 - Cybersecurity Threat Landscape ...19Decks487Flashcards7Learners -
Sécurité informatique
Sécurité informatique
By: Charlie de Lanauze
Chapitre 1 : Histoire des codes secrets, Chapitre 2 : La confidentialité dans un système de cryptographie à clés privées, Chapitre 3 : L'intégrité à partir de clés secrètes ...6Decks70Flashcards1Learner -
AWard GCSE Computer Science
AWard GCSE Computer Science
By: 9A Amy Ward
Cryptography, 1.4 CPU, System Performance, 1.3 Memory ...8Decks131Flashcards1Learner -
INF4831 - Information Security
INF4831 - Information Security
By: Cindy Kriel
Chapter 1 - Introduction, Chapter 2 - Toolbox: Authentication, Access Control and Cryptography, Chapter 3 - Programs and programming ...4Decks186Flashcards8Learners -
Security Plus
Security Plus
By: Caleb Stewart
Ch1, Ch2: Identity and Access Management, Ch3: Exploring Network Technologies and Tools ...12Decks507Flashcards17Learners -
CompTIA Security+ SYO-501
CompTIA Security+ SYO-501
By: Brittany Nicole
Practice Exam 1, Chapter 1: Mastering Security Basics, Chapter 2: Understanding Identity and Access Management ...13Decks1,089Flashcards24Learners -
Part II
Part II
By: Steven Mai
Linear Analysis, Rep Theory, Galois Theory ...8Decks193Flashcards1Learner -
Communication Systems
Communication Systems
By: Unknown Unknown
1.0 General Overview, 1.1 Signals and Transmissions, 1.2 Transmission Media ...18Decks257Flashcards1Learner -
INFOSYS 727
INFOSYS 727
By: Kinzi Catalano
Risk Management Continue, Informationn Security And Risk Management, Security Management ...54Decks633Flashcards1Learner -
CS6035 IIS
CS6035 IIS
By: Carol Cheung
Cryptography Intro, Symmetric Encryption, Public Key Cryptography ...8Decks90Flashcards6Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards2Learners -
Security+ prep
Security+ prep
By: Michael Vlieger
Security Refresh, Security+ Ports, Cryptography ...5Decks147Flashcards3Learners -
CompTIA Security Notes
CompTIA Security Notes
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Maware Infections ...32Decks886Flashcards1Learner -
csc2031
csc2031
By: Alex Freeman
Security Basics, Input Threats & Validation, Handling errors ...17Decks188Flashcards5Learners
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems