Logo
Search
Search
View menu

Computer Security & Cryptography

We often see hash functions and asymmetric function keys to transmit any message to codes in a more secure form. Cryptography is a method to protect data and information in an encrypted manner. The cloud computing enables the user to access any data from anywhere with the help of internet. It is of high accessibility which can be both public or private. Computer science is predominantly the study of the vast arena of computer and its technology. Computer is a device which is used to store and process any data. Video games can enhance concentration and skills of students. Nowadays technology has been developed so efficiently that even machines began to behave like human beings. Besides being an electronic machine, computer has the capability to perform arithmetic and logical functions. Algorithms are simply a set of instructions made for performing a given function for a computer system. Cryptography is used in ATM too.

All resources

Cryptography & Network Security

Presentations | English

1

Picture of the user

Gokul JL

Lumens

18.25

Computer Security

Presentations | English

1

Blockchain Technology

Presentations | English

Information Privacy

Presentations | English

Cryptography and Network Security

Presentations | English

Cyber World

Presentations | English

2

Multilevel Security & Dual OTP System

Presentations | English

3

Cryptography and Network Security

Presentations | English

Blockchain Technology

Presentations | English

2

Biometric Technology

Presentations | English

Android Security

Presentations | English

Blockchain and Cryptocurrency Technologies

Presentations | English

1

Internet Security

Presentations | English

Picture of the user

Ansif S

Lumens

6.00

Ethical Hacking

Presentations | English

2

Picture of the user

Gokul JL

Lumens

15.00

Ethical Hacking

Presentations | English

2

Bar Coding

Presentations | English

Picture of the user

Seamless

Lumens

19.75

Security

Presentations | English

1

Picture of the user

Gokul JL

Lumens

13.00

Cyber Security

Presentations | English

1

Ethical Hacking

Presentations | English

E-Authentication

Presentations | English

6

Security Monitoring and Control System

Presentations | English

1

Cyber Security

Presentations | English

4

Picture of the user

Ridhi Kumari

Lumens

138.00

153.00

Quantum Cryptography

Presentations | English

3

Biometrics Technology

Presentations | English

Barcoding

Presentations | English

1

IDS

Presentations | English

1

Barcoding

Presentations | English

11

Barcode

Presentations | English

Security

Presentations | English

2

Finger Print Authentication

Presentations | English

2

Picture of the user

Gokul JL

Lumens

10.00

Cryptography

Presentations | English

3

Malware Analysis

Presentations | English

Ethical Hacking

Presentations | English

1

Fingerprint Authentication

Presentations | English

3

Barcode

Presentations | English

Computer Security

Presentations | English

Biometrics Technology

Presentations | English

Bar Coding

Presentations | English

Other categories