Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Birthday attack
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (4)
Login to filter by course
Login to filter by course
Reset
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Cybersecurity Fundamentals
Covers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Hash Collisions: Exploitation Techniques and Strategies
Explores hash collisions, attacks on hash functions, and strategies for exploiting them in file formats like JPEG and PDF.
Bayes' Theorem: Defective Parts Detection
Explores Bayes' Theorem for defective parts detection, discrete random variables, and distribution functions, with practical examples and exercises.
Previous
Page 1 of 1
Next