👨🎓 北京交通大学计算机科学与技术学院研究生课程资料、笔记、回忆和整理的期末考试卷及课程作业。希望对你们有所帮助❤️,如果喜欢记得给个star🌟
-
Updated
Sep 19, 2024 - Jupyter Notebook
👨🎓 北京交通大学计算机科学与技术学院研究生课程资料、笔记、回忆和整理的期末考试卷及课程作业。希望对你们有所帮助❤️,如果喜欢记得给个star🌟
Created a simple website for an antique store, however it attempts to be a very secure website with many different securities implemented
AES encryption algorithm implementation in C++
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
feature extraction and matching of fingerprints based on image data
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Steganography with image, text & audio
Computer Science 161: Computer Security
ARP spoofing, MITM attack, pharming attack implemented in C++
IPsec transport mode session hijacking implemented in C++
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
Projects in computer security capstone in NYCU
A collection of awesome security hardening guides, tools and other resources
The Data Encryption Standard (DES) implementation used for encrypting/decrypting blocks of bits. This program implements the complex algorithm in C++.
A PowerShell script that monitors a directory in real-time, logging file changes including creations, deletions, and modifications using SHA256 hashes for integrity verification.
Final group project made for Computer Security @ UBI - Portugal.
This is the implement of the Chacha20 algorithm that applies actual real-time encryption on user input data/texts
⏰ Computer Architecture and Security Conference Deadline Countdowns (Based on AI Deadlines)
A C implementation of Schnorr Protocol for Interactive Zero-Knowledge Proofs
01076042 INFORMATION AND COMPUTER SECURITY
Add a description, image, and links to the computer-security topic page so that developers can more easily learn about it.
To associate your repository with the computer-security topic, visit your repo's landing page and select "manage topics."