• Duration:45 minutes and 4 seconds
  • Date:2017/05/16
  • Uploader:老白菜
Introduction
This set of information security introduction video tutorials is taught by Mr. Li Hui from Xi'an University of Electronic Science and Technology. Reference textbooks include "Modern Cryptography" edited by Yang Bo published by Tsinghua University Press, "Information Security Theory and Technology" edited by China Information Security Product Evaluation and Certification Center published by People's Posts and Telecommunications Press, and Wang Yumin and Liu Jianwei published by Xi'an University of Electronic Science and Technology Press He edited three textbooks including "Communication Network Security and Confidentiality".
Introduction to Information Security is a very important professional basic course for computer major students, which mainly talks about password-related knowledge. The main contents of this set of information security introduction include: introduction to information security, cryptography basics, stream ciphers, block ciphers, public key cryptography, key distribution and key management, message authentication and hash algorithms, digital signatures and cryptographic protocols, network encryption and Authentication, firewall and access control, intrusion detection and auditing, etc. I hope this set of information security introduction video tutorials will be helpful to everyone's learning.
Unfold ↓

You Might Like

Recommended Posts

Live Broadcast with Prizes | Microchip Security Solutions Seminar Series
For decades, Microchip has provided security product solutions for healthcare, cloud service connections, payment systems and a variety of applications with higher security requirements. In order to e
EEWORLD社区 Security Electronics
Revolutionizing radar design with electronically reconfigurable GaN power amplifiers
This blog post originally appeared in Microwave Product Digest* This paper demonstrates for the first time a reliable commercial high power amplifier based on a multi-band transmitter design that uses
石榴姐 RF/Wirelessly
How UWB calculates location
The application of UWB is also very clear. There are three main applications: imaging, communication and measurement, and vehicle-mounted radar systems. Looking at it from a macro perspective, the hig
兰博 RF/Wirelessly
Give me a schematic diagram of Xiaomi 2s
I'm learning embedded systems recently. I have two discarded Xiaomi 2s phones, but I don't have the schematics, so I can't experiment. Does anyone have a set? I don't have any.
beijihubigu Download Centre
[Repost] When choosing a finished power module, should you use an isolated or non-isolated power solution?
When designing a power supply circuit for an embedded system or selecting a finished power supply module, one of the important issues to consider is whether to use an isolated or non-isolated power su
皇华Ameya360 Power technology
Qorvo Q&A on Connectivity: Reducing Wi-Fi Interference
Q: What are the main concerns for customers regarding interference?For 2.4 GHz Wi-Fi, both interference and coexistence are very importantPrimarily because our mobile products emit many surrounding si
Jacktang RF/Wirelessly

Recommended Content

可能感兴趣器件

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号