Personal Information
Sector
Education
Etiquetas
encryption
mode 2
mode 1
counter
binary tree
ssl
block ciphers
pai
baud rate
digital signature
unit_1_sepm
unit 1_sepm
aes
ivt
8051
strength
linear
physical
terminology
segments
address spaces
queue
stack
dll
address translation in 80386
data structure
data structures
protection
page level protection
segment descriptors
logical
linear to physical address translation
types of segment descriptors
multitasking
pte
pdt
paging
task switching
tss descriptor
task state segment
tss
tr
task register
shiftrows
subbytes
advanced encryption standard
key generation
single round structure
des- history
feistel cipher structure
idle block cipher
block cipher
diffie-hellman key exchange
secrete key
public-key certificates
public-key authority
publicly available directory
public announcement
distribution of public keys
rsa example
components of public key crypt
public key cryptography
rsa
stream ciphers
rail fence transposition
multiple stage transposition
row transposition
services
mechanism
fundamentals
general tree
bt
dfs
single bit instrctions
examples
serial
parallel
synchronous
asynchrous
data transfer
data framing
sfrs
sbuf
scon
pcon
serial mode
doubling baud rate
ri
ti
unit 1_ sepm
unit 2_sepm
8051 interfacing
interrupt handler
types of interrupts in 8051
isr
ip
ie
interrupt
timer interrupt
port 1
port 0
port 3
port 2
ways of accessing ports
bit addressability
gdt
ldt
interrupts
exceptions
aborts
faults
traps
types of interrypts
real mode
protected mode
80386
exception processing
protecction in 80386
call gate
call gate structure
conforming code segment
serial port programming
transfer data
receive data
mode 1 programming
mode 2 programming
counter programming
timer
timer 0 register
timer 1 register
tmod
tcon
operating modes of timers
8051 microcontroller
unit 5
interrupt in 80386
idt
initial stages of attacks
phishing
password cracking
strong password
weak password
guidelines to prevent password
keylogger
hardware keyloggers
software keylogger
anti keyloggers
spywares
virus
worm
dos
ddos
tools to launch dos
tools to launch ddos
pornographic offenses
password sniffing
identity theft
credit card frauds
internet time theft
hacking
salami attack
logic bomb
trojan horse
industrial spying
how criminals plan attack?
social engineering
human-based social engineering
computer-based social
cyberstalking
types of stalkers
how stalking works
feature selection
feature construction
transformation
feature selection techniques
filter feature selection
wrapper method
embedded method
curse of dimensionality
dataset preparation
training vs. testing dataset
bias
variance
underfitting
overfitting
dataset validation techniques
hold-out
kfold cross validation
tools to prevent dos/ ddos
sql injection
cyber laws
indian context
the indian it act-challenges
challenges to indian law
cybercrime scenario in india
indian it act
introduction to ml
real life applications
introduction to data
types of ml
supervised machine learning
unsupervised machine learning
semi-supervised ml
reinforcement learning
feature
message digest algorithm
md5
md5 working
md5 solved example
digital certificate
certification authority
contents of digital certificat
digital certificate versions
certificate types
kerberos protocol
working
version 5
private key management
guidelines
key updates
mechanism to protect key
ipsec
traversal
mixcolumns
addroundkey
decryption
gf polynomial theorem
example
all rounds
secure hash algorithm
sha
sha-1
purpose
sha applications
sha working
cryptographic hash function
requirements of cryptographic
applications of cryptographic
two simple hash functions
cyberspace
cybercrime and information sec
cybercriminals
types
legal perspective
global perspective
indian perspective
crime
types of crimes
cybercrime against individuals
cybercrime against property
cybercrime against organizatio
cybercrime against society
email spoofing
spamming
cyberdefamation
computer sabotage
ah
esp
authentication header
encapsulating security payload
tunnel mode
transport mode
security association
ike
internet key exchange proocol
introduction to ssl
handshake protocol
record layer protocol
introduction to cybercrime
cybercrime
definitions
attacks
cyberterrorism
leave-one-out cv
Ver más
Presentaciones
(71)Personal Information
Sector
Education
Etiquetas
encryption
mode 2
mode 1
counter
binary tree
ssl
block ciphers
pai
baud rate
digital signature
unit_1_sepm
unit 1_sepm
aes
ivt
8051
strength
linear
physical
terminology
segments
address spaces
queue
stack
dll
address translation in 80386
data structure
data structures
protection
page level protection
segment descriptors
logical
linear to physical address translation
types of segment descriptors
multitasking
pte
pdt
paging
task switching
tss descriptor
task state segment
tss
tr
task register
shiftrows
subbytes
advanced encryption standard
key generation
single round structure
des- history
feistel cipher structure
idle block cipher
block cipher
diffie-hellman key exchange
secrete key
public-key certificates
public-key authority
publicly available directory
public announcement
distribution of public keys
rsa example
components of public key crypt
public key cryptography
rsa
stream ciphers
rail fence transposition
multiple stage transposition
row transposition
services
mechanism
fundamentals
general tree
bt
dfs
single bit instrctions
examples
serial
parallel
synchronous
asynchrous
data transfer
data framing
sfrs
sbuf
scon
pcon
serial mode
doubling baud rate
ri
ti
unit 1_ sepm
unit 2_sepm
8051 interfacing
interrupt handler
types of interrupts in 8051
isr
ip
ie
interrupt
timer interrupt
port 1
port 0
port 3
port 2
ways of accessing ports
bit addressability
gdt
ldt
interrupts
exceptions
aborts
faults
traps
types of interrypts
real mode
protected mode
80386
exception processing
protecction in 80386
call gate
call gate structure
conforming code segment
serial port programming
transfer data
receive data
mode 1 programming
mode 2 programming
counter programming
timer
timer 0 register
timer 1 register
tmod
tcon
operating modes of timers
8051 microcontroller
unit 5
interrupt in 80386
idt
initial stages of attacks
phishing
password cracking
strong password
weak password
guidelines to prevent password
keylogger
hardware keyloggers
software keylogger
anti keyloggers
spywares
virus
worm
dos
ddos
tools to launch dos
tools to launch ddos
pornographic offenses
password sniffing
identity theft
credit card frauds
internet time theft
hacking
salami attack
logic bomb
trojan horse
industrial spying
how criminals plan attack?
social engineering
human-based social engineering
computer-based social
cyberstalking
types of stalkers
how stalking works
feature selection
feature construction
transformation
feature selection techniques
filter feature selection
wrapper method
embedded method
curse of dimensionality
dataset preparation
training vs. testing dataset
bias
variance
underfitting
overfitting
dataset validation techniques
hold-out
kfold cross validation
tools to prevent dos/ ddos
sql injection
cyber laws
indian context
the indian it act-challenges
challenges to indian law
cybercrime scenario in india
indian it act
introduction to ml
real life applications
introduction to data
types of ml
supervised machine learning
unsupervised machine learning
semi-supervised ml
reinforcement learning
feature
message digest algorithm
md5
md5 working
md5 solved example
digital certificate
certification authority
contents of digital certificat
digital certificate versions
certificate types
kerberos protocol
working
version 5
private key management
guidelines
key updates
mechanism to protect key
ipsec
traversal
mixcolumns
addroundkey
decryption
gf polynomial theorem
example
all rounds
secure hash algorithm
sha
sha-1
purpose
sha applications
sha working
cryptographic hash function
requirements of cryptographic
applications of cryptographic
two simple hash functions
cyberspace
cybercrime and information sec
cybercriminals
types
legal perspective
global perspective
indian perspective
crime
types of crimes
cybercrime against individuals
cybercrime against property
cybercrime against organizatio
cybercrime against society
email spoofing
spamming
cyberdefamation
computer sabotage
ah
esp
authentication header
encapsulating security payload
tunnel mode
transport mode
security association
ike
internet key exchange proocol
introduction to ssl
handshake protocol
record layer protocol
introduction to cybercrime
cybercrime
definitions
attacks
cyberterrorism
leave-one-out cv
Ver más