Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Classified information
Applied sciences
Computer engineering
Computer security
Privacy
Graph Chatbot
Related lectures (14)
Login to filter by course
Login to filter by course
Reset
Hadamard Factorization and Zeros of Zeta
Completes the proof of Hadamard Factorization and uses it to derive an expression for the zeta function in terms of its zeros.
Functional Equation of Zeta and Hadamard Products
Covers the functional equation of the Zeta function and the Hadamard factorization theorem.
De-anonymization: The Risks of Anonymized Data
Discusses the risks of sharing supposedly anonymous data and the techniques to protect sensitive information.
Stirling's Formula and Functional Equation for Zeta
Covers the proof of Stirling's asymptotic formula for the Gamma function and the functional equation of the Zeta function.
Introduction to Cryptography
Explores cryptography techniques to keep information confidential and the importance of structuring data.
Security Best Practices: Authentication and Good Conduct
Discusses security best practices, such as creating secure passwords and protecting personal networks.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Data Privacy: Anonymization and Protection
Discusses choosing relevant capsules and data privacy techniques.
Adversarial Thinking: Common Weaknesses Enumeration
Explores adversarial thinking, common weaknesses, and ineffective defenses in software systems, emphasizing the importance of mitigating prevalent vulnerabilities.
Specific Contracts: Mandate, Confidentiality, Joint Ventures
Explores mandate contracts, confidentiality agreements, and joint ventures in business.
Privacy: Why is privacy important
Explores the importance of privacy in democratic societies and the shared security infrastructure across individuals, industry, and governments.
Public Key Cryptography
Explores public key cryptography, enabling secure communication and key exchange between Alice and Bob.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Logarithmic Derivative of Zeta
Explores the logarithmic derivative of the Zeta function using the Hadamard factorization.
Previous
Page 1 of 1
Next