Cybersecurity | Cloud | DevelopmentObject Oriented Programming in Java (OOP) | Full Course December 15, 2024 video Algorithmscryptographydata structurefree java online traininghash tableJavaJava (programming Language)Java Arraysjava Basicsjava codingjava coursejava Data typesjava full coursejava programmingjava programming for beginnersjava trainingjava tutoriallinked Listlogic programmingObject-Oriented Programming (OOP)problem solvingprogrammingsorting algorithmstring (Computer Science)trees (Data Structures)yoyo codingyoyo education
Cybersecurity | Cloud | DevelopmentUnderstand passkeys in 4 minutes November 13, 2024 video androidAuthenticationchromeChrome Developerchrome developerscryptographyDevelopersFIDOgooglegoogle chromegoogle chrome developersgoogle developersmobile authenticationPasskeypasskeyspasswordpassword managerpasswordlessPasswordless authenticationpasswordsSecuritywebweb authenticationweb devwebauthn
Cybersecurity | Cloud | DevelopmentStateful Hash-Based Signature Schemes August 3, 2024 video AlgorithmcryptographyCybersecurityhash based signaturesPost-QuantumPost-Quantum CryptographyPQCquantumQuantum Computer
Cybersecurity | Cloud | DevelopmentStatus update from NIST March 16, 2024 video AlgorithmcryptographyNISTPost-QuantumPost-Quantum CryptographyPQCquantum
Cybersecurity | Cloud | DevelopmentBLS signatures, hashing to curves, and more dispatches from the IETF March 5, 2024 video cryptographyCryptology
Cybersecurity | Cloud | DevelopmentMark B Cooper – PKI and SHAKEN STIR Will Fix Robocalls – DEF CON 27 Crypto and Privacy Village November 10, 2023 video CONconference speakerscryptographyDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferenceprivacysecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentBasics of Cryptography October 11, 2023 video artAugurBinancebitcoinBitSharesblockblockchainBlocknetBytesCardanoCashClassicCreditscryptocryptocurrencycryptographyCryptonexDashdtubeElectroneumEnigmaeosethereumEthosgameGoldGolemGXShareshashiconIconomiIOTALedgerlifeLiskLitecoinMoneromoneyNEOnetworkOmiseGOphotographyPIVXPowerproducerspublic keyPublic-key CryptographyQuantstampRipplescienceSiacoinsteemsteemitTechnologyTokensVeChainVERGEVertcoinZCoin
Cybersecurity | Cloud | DevelopmentInterview Questions on cryptography and communication controls in ISO 27001 April 5, 2023 video Audit'BSIcommunicationcontrols in iso 27001cryptographyinterviewinterview questionsISO 27001 auditISO 27001 certificationiso 27001 controlsISO certificationISO vendor
Cybersecurity | Cloud | DevelopmentAttacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack February 3, 2023 video cryptographyCryptology
Cybersecurity | Cloud | DevelopmentOSDC 2014: Michael Renner – Secure encryption in a wiretapped future September 9, 2022 video 2014Berlincryptographydata centerimproving cryptographicMichael RennerOpen Source Data Center Conferenceosdcpublications by Edward SnowdensslTLS