Intro

Results: 5819



#Item
1Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
2System software / BIOS / Computer architecture / Boot loaders / Booting

Forth Day: Green Arrays, Inc.  Greg Bailey – Intro: The State of Green Arrays  Stefan Mauerhofer – Eval Board Application: Low Frequency Clock and UART

Add to Reading List

Source URL: www.forth.org

Language: English - Date: 2013-11-18 20:24:28
3Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
4

Bitcoin Intro Bitcoin for Beginners About Intro

Add to Reading List

Source URL: learnmeabitcoin.com

- Date: 2017-09-21 08:13:05
    5

    Bitcoin Workshop Transactions Intro Transactions

    Add to Reading List

    Source URL: learnmeabitcoin.com

    - Date: 2017-09-21 08:13:05
      6Cryptography / Cryptographic hash functions / HMAC / MD5 / Crypt / Collision attack / Padding / SHA-2 / MerkleDamgrd construction / SHA-1 / Hash function / Length extension attack

      EECS 388 Intro to Computer Security September 9, 2016 Project 1: Cryptographic Attacks

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22
      7Cryptography / Cyberwarfare / Computer security / Key management / Public key infrastructure / Software bugs / Computer network security / E-commerce / Buffer overflow / HTTP cookie / Cross-site scripting / Certificate authority

      EECS 388 Intro to Computer Security November 11, 2016 Homework 5: Exam Review

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2016-11-21 18:50:22
      8

      Bitcoin Mining An Introduction About Intro

      Add to Reading List

      Source URL: learnmeabitcoin.com

      - Date: 2017-10-03 07:28:56
        9Cryptocurrencies / Alternative currencies / Volunteer computing / Robot kits / Nxt / Economy / Money / Lego Mindstorms / Proof-of-stake / Dakota Kai / Finance

        INTRO “It was a bright cold day in April, and the clocks were striking thirteen.” These immortal words began George

        Add to Reading List

        Source URL: nxtplatform.org

        Language: English - Date: 2018-07-25 08:01:09
        10Theoretical computer science / Metaphysics / Computer science / Alan Turing / Computability theory / Theory of computation / Models of computation / ChurchTuring thesis / Quantum computing / Quantum mechanics / Turing machine / Introduction to quantum mechanics

        Lecture 1, Tues Jan 17: Course Intro, Church-Turing Thesis ● ● ●

        Add to Reading List

        Source URL: www.scottaaronson.com

        Language: English - Date: 2018-08-29 15:30:40
        UPDATE