Videos

Published on July 16th, 2011 📆 | 7252 Views ⚑

0

Chapter 5, part 5, Information Security: Principles and Practice


iSpeech


Information Security: Principles and Practice, 2nd edition, by Mark Stamp
Chapter 5: Hash Functions++
Section 5.8.2
hash functions, uses for hash functions
Class Lecture, 2011


2011-07-16 00:35:47

source





Tagged with:



Comments are closed.