Tags: Computer Programming, Cryptography, Technology & Engineering
Study Cryptography
Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security+
Security+
By: Karin Mayville
Acronyms, 1 - Today's Security Professional, 2 - Cybersecurity Threat Landscape ...19Decks487Flashcards12Learners -
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)
By: Alex valentine
Networking Basics and Terminology, Introduction to Security Terminology, Security Policies and Standards ...20Decks695Flashcards10Learners -
CS110 (discrete) 7:30-9am m-tue
CS110 (discrete) 7:30-9am m-tue
By: NOVY MAR QUILLOSA
Graph Theory in Discrete Mathematics, Number Theory in Discrete Mathematics, Probability and Statistics in Computing ...4Decks47Flashcards1Learner -
CSBC Discord S+
CSBC Discord S+
By: Dane Andreasen
Networking Basics and Terminology (1), Networking Basics and Terminology (2), Introduction to Security Terminology ...26Decks658Flashcards35Learners -
Computer Security
Computer Security
By: Pall Magnusson
Computer security and malware, Network security, Operating system security ...7Decks73Flashcards1Learner -
Security and Programming Paradigms
Security and Programming Paradigms
By: Ab Up
Security Basics, Programming Paradigm basics, Input threats ...16Decks226Flashcards1Learner -
CyberSecurity
CyberSecurity
By: Rakim Allah
Chapter 11, Chapter 12, Chapter 13 ...21Decks831Flashcards127Learners -
Sécurité informatique
Sécurité informatique
By: Charlie de Lanauze
Chapitre 1 : Histoire des codes secrets, Chapitre 2 : La confidentialité dans un système de cryptographie à clés privées, Chapitre 3 : L'intégrité à partir de clés secrètes ...6Decks70Flashcards1Learner -
CS6035 IIS
CS6035 IIS
By: Carol Cheung
Cryptography Intro, Symmetric Encryption, Public Key Cryptography ...8Decks90Flashcards6Learners -
Sec
Sec
By: Gian Carlo Francisco
Quiz 1, Quiz 2, L4 - Operating System Security ...18Decks310Flashcards12Learners -
COMP 156 Computer Concepts
COMP 156 Computer Concepts
By: G M
What's In A Computer? (Week 2), Binary + Representation of Info (Week 3), Hexidecimal, CPU, and the Toy Computer (Week 4) ...12Decks381Flashcards35Learners -
Security+ Concepts
Security+ Concepts
By: erik hogberg
Cryptography & PKI, Network & Protocols, Threats, Attacks & Vulnerabilities ...9Decks393Flashcards1Learner -
CSE 5473 Midterm
CSE 5473 Midterm
By: Josh Barbee
Network Security Basics, Classical Ciphers, Cipher Modes ...8Decks232Flashcards2Learners -
CISSP Study
CISSP Study
By: Logan Ninefingers
Security and Risk Management, Asset Security, Security Engineering ...13Decks572Flashcards6Learners -
Information Security
Information Security
By: Akila Weeratunga
Introduction, Intro to Cryptography, Hash functions and MAC ...6Decks55Flashcards4Learners -
CompTIA Security+
CompTIA Security+
By: Rene Vargas
Chapter 2 - Monitoring Networks, Chapter 1 - Measuring and Weighing Risk, Chapter 3 - Understanding Devices and infrastructure ...12Decks292Flashcards51Learners -
Part II
Part II
By: Steven Mai
Linear Analysis, Rep Theory, Galois Theory ...8Decks193Flashcards1Learner -
csc2031
csc2031
By: Alex Freeman
Security Basics, Input Threats & Validation, Handling errors ...17Decks188Flashcards5Learners -
SSCP
SSCP
By: Maria Smith
2. Understand Security Concepts, 1. ISC2 Code Of Ethics, Vocabulary ...11Decks508Flashcards1Learner -
Network Security
Network Security
By: Kimani Kelly
Introduction to Security, Pervasive Attack Surfaces and Controls, Fundamentals of Cryptography ...4Decks61Flashcards1Learner -
Security Plus
Security Plus
By: Caleb Stewart
Ch1, Ch2: Identity and Access Management, Ch3: Exploring Network Technologies and Tools ...12Decks507Flashcards17Learners -
CSF Finals
CSF Finals
By: Justin Ooi
Cryptography, Access Control, Steganography ...13Decks161Flashcards1Learner -
cissp-ac
cissp-ac
By: Al Colon
Al's Cissp, Fires, Calculations ...15Decks158Flashcards15Learners -
IT Security: Defense against the Digital Dark Arts
IT Security: Defense against the Digital Dark Arts
By: Kendog TV
Week 1 - Other Attacks, Week 2 - Symmetric Encryption, Week 2 - Public Ker or Asymmetric Encryption ...5Decks116Flashcards1Learner -
Living in the IT Era
Living in the IT Era
By: Jan Wilhelm Sy
Chapter 0: Introduction to LITE, Chapter 2: Computer COmponents, Chapter 2.1: Computer Components P2 ...9Decks230Flashcards1Learner -
CompTIA Security+ SYO-501
CompTIA Security+ SYO-501
By: Brittany Nicole
Practice Exam 1, Chapter 1: Mastering Security Basics, Chapter 2: Understanding Identity and Access Management ...13Decks1,089Flashcards24Learners -
CPIA
CPIA
By: Dan Morgan
IP Protocols, Ip Protocols, Network Architecture ...9Decks50Flashcards7Learners -
Security+ Get Certified Get Ahead SY0-501
Security+ Get Certified Get Ahead SY0-501
By: Jennifer Kajiwara
Chapter 1 Mastering Security Basics, Chapter 2 Understanding Identity and Access Management, Chapter 3 Exploring Network Technologies and Tools ...11Decks1,443Flashcards5Learners -
CS111 InfoSec
CS111 InfoSec
By: Thomas Collins
Lectures up to 9/2, Public Key Cryptography, Lecture 6 - Risk ...5Decks76Flashcards1Learner -
Computer security Quiz 2
Computer security Quiz 2
By: Liau Zheng Wei
SingHealth cyber attack, Auth and Passwords, Passwords ...7Decks124Flashcards5Learners
-
Entrance Exams
-
Professional Certifications
-
Foreign Languages
-
Science
-
English
-
Humanities & Social Studies
-
Mathematics
-
Medical & Nursing
-
Vocations
-
Law
-
Health & Fitness
-
Business & Finance
-
Technology & Engineering
-
Food & Beverage
-
Fine Arts
-
Random Knowledge
-
Architecture
-
Biotechnology
-
Computer Programming
-
Computer Science
-
Engineering
-
Graphic Design
-
Information Security
-
Information Technology
-
Management Information Systems
-
Technology Certifications