1. Applied Cryptography
2. Handbook of Applied Cryptography
3. The Code Book
4. Cryptography and Network Security: Principles and Practice
5. Introduction to Modern Cryptography
Views: 830
Patel Vidhu
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 7178
nptelhrd
totally clickbait. but also not clickbait. I don't know where to start hacking, there is no guide to learn this stuff. But I hope you still have a plan now!
How to learn hacking - https://www.youtube.com/watch?v=iKXd9zW1OuI
The ultimate guide,
everything you need to know - https://google.com
Stuff that looks cool:
crypto challenges - https://cryptopals.com/
wargames - https://overthewire.org
other exploit challenges - http://pwnable.kr/
basics of exploitation (+ my playlists) - https://exploit-exercises.com/protostar/
math puzzles with programming - https://projecteuler.net
break ethereum smart contracts - https://ethernaut.zeppelin.solutions/
Try something new:
create an android app - https://developer.android.com/training/basics/firstapp/index.html
create a website with python - http://flask.pocoo.org/
do some nice animations - https://processing.org/tutorials/
make some LEDs blink - https://www.arduino.cc/en/Guide/HomePage
Other Channels:
GynvaelEN - https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg
MurmusCTF - https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A
MalwareAnalysisForHedgehogs - https://www.youtube.com/channel/UCVFXrUwuWxNlm6UNZtBLJ-A
hasherezade - https://www.youtube.com/channel/UCNWVswPNgn5kutPNa5sprkg
IppSec - https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
John Hammond - https://www.youtube.com/user/RootOfTheNull
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://amzn.to/2LW6ldx
→ Graphics tablet:* https://amzn.to/2C8djYj
→ Camera#1 for streaming:* https://amzn.to/2SJ66VM
→ Lens for streaming:* https://amzn.to/2CdG31I
→ Connect Camera#1 to PC:* https://amzn.to/2VDRhWj
→ Camera#2 for electronics:* https://amzn.to/2LWxehv
→ Lens for macro shots:* https://amzn.to/2C5tXrw
→ Keyboard:* https://amzn.to/2LZgCFD
→ Headphones:* https://amzn.to/2M2KhxW
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
Views: 571031
LiveOverflow
SPEAKER & AFFILIATION:
Ravi Sandhu, University of Texas at San Antonio
DESCRIPTION & LINK:
This lecture has been videocast from the Computer Science Department at NCSU. The abstract of this lecture and a brief speaker biography is available at http://research.csc.ncsu.edu/colloquia/seminar-post.php?id=413.
For a complete transcript of this lecture, go to http://www.ncsu.edu/youtube/transcript/sandhu-transcript.doc.
Views: 716
NCState
Show Notes : https://letstalkbitcoin.com/blog/post/bitcoins-and-gravy-67-brain-wallets-explained
Transcript : http://bitcoinsandgravy.com/bitcoins-and-gravy-67-brain-wallets-explained-transcript
Transcription/Captioning provided by : https://diaryofafreelancetranscriptionist.com
https://twitter.com/TranscriptJunky
Views: 45
Bitcoins and Gravy
This is a mini-documentary about the mysterious Illuminati card game, covering the game's history, examining the background of the game maker, reviewing the events depicted on the card faces, and finally, posing this question:
Are the characters, events, and agendas portrayed through the Illuminati card game merely prophecies or a series of strange coincidences—or are we, the players, being provided the script for reality our invisible opponent seeks to bring to fruition?
"Like This" Musical Jingle by https://twitter.com/CerebralMusic
Subscribe For More - http://bit.ly/reallygraceful
What the Media Wont Tell You - http://bit.ly/reallygracefulplaylist
Support my channel on Patreon: https://www.patreon.com/reallygraceful
Please subscribe to my backup channel: http://bit.ly/reallygracefulsecondchannel
Join the discussion on Discord: https://discord.gg/6kuPnMK
Facebook: https://www.facebook.com/reallygraceful
Twitter: https://twitter.com/reallygraceful
Steemit: http://steemit.com/@reallygraceful
Instagram: www.instagram.com/reallygraceful/
About reallygraceful:
On this channel, I talk about suppressed history by connecting the past to the present. On the daily, we're inundated with breaking news headlines propagated on the radio, television, and social media. It's my goal to provide context so that we can collectively navigate through this information labyrinth.
The Mystery of the Illuminati Card Game: https://youtu.be/WG0nOpqI0UU
This material is not endorsed by Steve Jackson Games. The card game artwork belongs to Steve Jackson Games, as well as any trademarks associated with GURPS Cyberpunks, Illuminati or Raid on Iran.
reallygraceful
https://www.youtube.com/reallygraceful
#illuminati #illuminaticardgame #conspiracy
Views: 73275
reallygraceful
McGill University Centre of Genomics & Policy Director Dr. Bartha Maria Knoppers present a webinar titled, "Ethical Issues in Data Science."
Abstract
Big Data discussions often center on related privacy and security issues, to the neglect of the importance of other ethical issues in data-intensive research. The privacy protections in the European Union’s new General Data Protection Regulation, for example, although essential, must be balanced with the right of everyone to share in scientific advancement and its benefits, which originates in the 1948 Universal Declaration of Human Rights and has become the foundation of the Global Alliance for Genomics and Health's Framework for Responsible Sharing of Genomic and Health-Related Data. In this context, it is worthwhile examining whether the hitherto antinomy between privacy and security concerns and the benefits of data sharing still remains, or are health data governance frameworks, such as the 2017 OECD Recommendation on Health Data Governance, and other policies beginning to address and assuage such concerns?
Presenter
Bartha Maria Knoppers, PhD (Comparative Medical Law), is full professor, Canada Research Chair in law and medicine and Director of the Centre of Genomics and Policy, Faculty of Medicine, Human Genetics, at McGill University. She is a member of the Scientific Steering Committee of the International Cancer Genome Consortium (2009-present ), and Co-Chair of the Regulatory and Ethics Working Group of the Global Alliance for Genomics and Health. She holds four doctorates Honoris Causa and she is a fellow of the American Association for the Advancement of Science (AAAS), the Hastings Center (bioethics), the Canadian Academy Health Sciences (CAHS), and of the Royal Society of Canada. She is also an Officer of the Order of Canada and of Quebec.
Download presentation slides:
https://drive.google.com/open?id=0B4IAKVDZz_JUUTB0YzFmVlUwVlk
Visit our webpage to see the lecture schedule and learn how to join our next live lecture:
http://www.bigdatau.org/data-science-seminars
Views: 1420
BD2K Guide to the Fundamentals of Data Science
Follow the easy setup steps for your FreeStyle Lite System to set the time and date, prepare your lancing device and perform a blood glucose test.
For additional information visit https://www.myfreestyle.com/freestyle-lite-overview
Views: 46033
FreeStyle US
Despite a plethora of data security and protection standards and certifications, companies and their systems are still leaking information like a sieve. For instance, Data Loss Prevention (DLP) solutions have often been touted as the "silver bullet" that will keep corporations from becoming the next headline. With deployment models ranging from a fat agent on an endpoint, to a blinky-lights box surveilling all network traffic, to some unified threat management gateway with DLP secret sauce, these solutions are ripe for bypass -- or worse.
This talk will discuss our previous and current research into a handful of DLP solutions, including their capabilities and their shortcomings. We will demonstrate flaws in administrative and programmatic interfaces and the inspection engines themselves.
Via this presentation we hope to have the audience walk away with a better understanding of the reality of certain classes of security products-- their advantages, their detriments, and whether or not they are of value to their organization. Additionally, we will detail the tools and techniques we used to discover these issues, to arm attendees with the knowledge to test these and similar products on their own.
Bio:
Zach Lanier is a Senior Research Scientist with Optiv, specializing in various bits of network, application, mobile, and embedded security. Prior to joining Optiv, Zach most recently served as a Senior Security Researcher with Duo Security. He has spoken at a variety of security conferences, such as Black Hat, DEFCON, CanSecWest, INFILTRATE, COUNTERMEASURE, and SummerCon, and is a co-author of the "Android Hackers' Handbook" (Wiley, 2014).
Views: 493
Duo Security
6:30pm ET
There is a latent distrust of the growing "Internet Of Things" market. The data collected by them is becoming more personal all while proliferation of internet connected devices is continuing without regard to privacy or security. Recent news stories has consumers concerned not only with privacy but also surveillance and data handling. There is no trusted third-party "consumer advocacy" for privacy. To compound the problem, "IoT" and internet connected consumer devices are each made from custom hardware and software. This lack of homogeneity in design makes traditional software based security (like "antivirus") virtually impossible. These devices and apps are literally "black boxes" that we entrust our privacy to.
Bio:
Stephen A. Ridley is a security researcher at Xipiter (http://www.xipiter.com/). He has more than 10 years of experience in software development, software security, and reverse engineering. Prior to Xipiter, Mr. Ridley served as the Chief Information Security Officer of a financial services firm and prior to that was a Senior Researcher at Matasano. He also was Senior Security Architect at McAfee, and a founding member of the Security and Mission Assurance (SMA) group at a major U.S defense contractor where he did vulnerability research and reverse engineering in support of the U.S. intelligence community. He has spoken about reverse engineering and software security at Black Hat, ReCon, CanSecWest, EuSecWest, Syscan and other prominent information security conferences. Stephen is a co-author of "The Android Hacker's Handbook" published by Wiley & Sons.
At Xipiter we've been working on the security of embedded systems and IOT devices. Xipiter has built several industry unique trainings (http://www.xipiter.com/training) on mobilesecurity and embedded device security. Each of which has sold out at Blackhat (the largest security conference in the world) for three years in a row. We've helped numerous manufacturers secure their embedded devices. From card-payment systems and set-top entertainment manufacturers to more esoteric vendors of Gaming systems (lottery, casino, etc) and Industrial Controls Systems. We also publicly blog about our exploitation of these devices (http://www.xipiter.com/musings).
Views: 1415
Duo Security