Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Tamer Khattab

L10-Public Key Cryptography and RSA - Basic Operation
L10-Public Key Cryptography and RSA - Basic Operation
L9-DES - Strength (3/3)
L9-DES - Strength (3/3)
L9-DES - Encryption Decryption Technique (2/3)
L9-DES - Encryption Decryption Technique (2/3)
L9-DES - Strong Cipher and Fiestal (1/3)
L9-DES - Strong Cipher and Fiestal (1/3)
L8-Classical Encryption Techniques - Classical Cipher (2/2)
L8-Classical Encryption Techniques - Classical Cipher (2/2)
L7-Classical Encryption Techniques - Symmetric Ciphers (1/2)
L7-Classical Encryption Techniques - Symmetric Ciphers (1/2)
L6-Number Theory - Prime Numbers and Chinese Remainder Theorem (3/4)
L6-Number Theory - Prime Numbers and Chinese Remainder Theorem (3/4)
L6-Number Theory - Discrete Logarithms (4/4)
L6-Number Theory - Discrete Logarithms (4/4)
L5-Number Theory - Modular Arithmetics (2/4)
L5-Number Theory - Modular Arithmetics (2/4)
L5-Number Theory - Divisibility and GCD (1/4)
L5-Number Theory - Divisibility and GCD (1/4)
T2-Tutorial 2
T2-Tutorial 2
L4-Information Theoretic Secrecy - Wiretap Channel and Secrecy Capacity (3/3)
L4-Information Theoretic Secrecy - Wiretap Channel and Secrecy Capacity (3/3)
L4-Information Theoretic Secrecy - Equivocation and Channel Capacity (2/3)
L4-Information Theoretic Secrecy - Equivocation and Channel Capacity (2/3)
L4-Information Theoretic Secrecy - Information and Entropy (1/3)
L4-Information Theoretic Secrecy - Information and Entropy (1/3)
L3-Wireless Network Security - WiFi Security (3/3)
L3-Wireless Network Security - WiFi Security (3/3)
L3-Wireless Network Security - WiFi Protocol (2/3)
L3-Wireless Network Security - WiFi Protocol (2/3)
L3-Wireless Network Security - General Considerations (1/3)
L3-Wireless Network Security - General Considerations (1/3)
T1-Tutorial 1
T1-Tutorial 1
L2-Overview of Wireless Networks
L2-Overview of Wireless Networks
L1-Introduction
L1-Introduction
L11: Sampling
L11: Sampling
L12: La Place Transform
L12: La Place Transform
Tutorial-3-FT
Tutorial-3-FT
Project Phase 2 - SW Equalizer
Project Phase 2 - SW Equalizer
Project Phase 1 - Voice collection and BW estimation
Project Phase 1 - Voice collection and BW estimation
L9: Fourier Transform - Introduction
L9: Fourier Transform - Introduction
L10: Fourier Transform - Famous Transforms and Filters
L10: Fourier Transform - Famous Transforms and Filters
PB3: Fourier Transform - Remarks
PB3: Fourier Transform - Remarks
Tutorial 3 - FS
Tutorial 3 - FS
PB2: Fourier Transform - Properties
PB2: Fourier Transform - Properties
  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]