Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Information Technology Security Course 2014
information technology security course 2014
Type:
Other
Files:
30
Size:
4.0 GB
Uploaded On:
Oct. 16, 2015, 10:11 p.m.
Added By:
mohaltron94
Seeders:
0
Leechers:
2
Info Hash:
0C44EA64AF1E8BE1E6EAB5252CE583E6118E8FD0
Get This Torrent
this is a course from University of Thammasat in 2014 by Steven Gordon, it is available in Youtube in the link: enjoy the high quality download by 4k video downloader
Get This Torrent
01-Introduction to IT Security (ITS335, L1, Y14).mp4
304.3 MB
03-Symmetric Key Encryption and Brute Forece (ITS335, L3, Y14).mp4
271.7 MB
23-iptables Firewall Examples (ITS335, L23, Y14).mp4
243.1 MB
08-Password Storage Approaches (ITS335, L8, Y14).mp4
219.4 MB
04-Authentication with Symmetric Key Ciphers (ITS335, L4, Y14).mp4
202.0 MB
05-Authentication with Hash Functions (ITS335, L05, Y14).mp4
196.6 MB
06-Public Key Crypto and Digital Signatures (ITS335, L6, Y14).mp4
185.1 MB
20-Web Browsing and HTTPS (ITS335, L20, Y14).mp4
172.8 MB
11-Malicious Software (ITS335, L11, Y14).mp4
172.0 MB
16-DDoS with Reflectors and Amplification (ITS335, L16, Y14).mp4
164.2 MB
07-User Authentication and Passwords (ITS335, L7, Y14).mp4
163.4 MB
24-Web Security Attacks (ITS335, L24, Y14).mp4
161.0 MB
21-Web Security and HTTPS (ITS335, L21, Y14).mp4
159.4 MB
18-Firewalls and Stateful Packet Insecption (ITS335, L18, Y14).mp4
156.4 MB
17-Firewalls (ITS335, L17, Y14).mp4
145.4 MB
28-Web Proxies, VPNs and Tor (ITS335, L28, Y14).mp4
141.2 MB
19-Firewall Examples and Proxies (ITS335, L19, Y14).mp4
140.2 MB
02-Encryption Techniques (ITS335, L2, Y14).mp4
125.7 MB
22-Digital Certificates (ITS335, L22, Y14).mp4
119.2 MB
09-Salts, Passwords and Rainbow Table Attacks (ITS335, L9, Y14).mp4
109.9 MB
10-Access Control (ITS335, L10, Y14).mp4
95.7 MB
11-Linux Permissions Examples (ITS335, L11, Y14).mp4
92.3 MB
27-Internet Privacy Options (ITS335, L27, Y14).mp4
85.2 MB
25-SQL Injection Attack (ITS335, L25, Y14).mp4
66.2 MB
11-Role-Based and Mandatory Access Control (ITS335, L11, Y14).mp4
63.6 MB
09-Overview of Token and Biometric Authentication (ITS335, L9, Y14).mp4
50.5 MB
19-iptables Example in a Virtual Network (ITS335, L19, Y14).mp4
30.1 MB
25-Unvalidated Redirect Attack (ITS335, L25, Y14).mp4
24.6 MB
25-Cross Site Request Forgery Attack (ITS335, L25, Y14).mp4
20.1 MB
25-Firefox with SOCKS Proxy to VirtualBox Node (ITS335, L25, Y14).mp4
6.0 MB
Similar Posts:
Category
Name
Uploaded
E-books
Ilin I. Digital Systems and Information Technologies in the Energy Sector 2024
April 13, 2025, 9:51 p.m.
E-books
Dagur A. Artificial Intelligence and Information Technologies Vol 2. 2025
Dec. 30, 2024, 1:20 p.m.
E-books
Dagur A. Artificial Intelligence and Information Technologies Vol 1. 2025
Dec. 30, 2024, 1:20 p.m.
E-books
Suh C. Probability for Information Technology 2025
Dec. 14, 2024, 11:30 a.m.
E-books
Information Technology. NSQF. Level-2, Class 10 2015
Nov. 20, 2024, 6:31 p.m.