Difference between revisions of "CSE539 Applied Cryptography"
From esoterum.org
Line 11: | Line 11: | ||
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | *[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | ||
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] | *[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] | ||
+ | |||
+ | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] === |