Found 425 presentations matching your search
security
Communications Asymmetry, Classification of Data Delivery Mechanisms, Data Dissemination, Broadcast ...
virtual screening and docking
Message Authentication and Hash Functions. This presentation shows how to authenticate a message to ...
Sorting and Hashing
Secure Hash Algorithm 512 (SHA-512) description with figure and equation according to the book of Be...
Map-Reduce Programming with Hadoop
This slide has the more about tools and techniques under informantion security and operating system...
A brief explanation on additive cipher with a part of implementation (decryption) and some of the r...
Directory implementation and allocation methods contiguous,linked,indexed,FAT
Hadoop-part1 in cloud computing subject
bitcoin
As the size and complexity of data increases, the proportion of unstructured data types also increa...
Network Security -Message Authentication
VPC
Tyyyhh
A basic detail about Data structures
Introduction to python syntaxes
Symmetric Key Cryptography 8. Introduction to Modern Symmetric Key Ciphers- DES, Blowfish, IDEA, AE...
Introduction to cryptography and application of cryptography
It is about the security threat and malwares and how to avoid them
This research is based on generating the lottery system software. The existing system of lottery is ...
Introduction to Laravel
Algorithms