• JavaScriptPHPHTMLCssPythonWordPressWeb developmentLinuxMySQLAndroid
    WindowsJavaC++ / C#LayoutReactUbuntuYiiDjangoProgramming1C-Bitrix
    LaravelSystem administrationTelegramJSONDebianPostgreSQLIOSGoogleHtaccessWindows Server
    GitMacOSGoogle ChromeCMSWooСommerceBootstrapNginxSQLUnityAPI
  • Ask
  • Leaders

Categories

JavaScriptPHPHTMLCssPythonWordPressWeb developmentLinuxMySQLAndroidWindowsJavaC++ / C#LayoutReactUbuntuYiiDjangoProgramming1C-BitrixLaravelSystem administrationTelegramJSONDebianPostgreSQLIOSGoogleHtaccessWindows ServerGitMacOSGoogle ChromeCMSWooСommerceBootstrapNginxSQLUnityAPI
Programming
JavaScript PHP HTML Css Python WordPress Web development Linux MySQL Android Windows Java C++ / C# Layout React Ubuntu Yii Django Programming 1C-Bitrix Laravel System administration Telegram JSON Debian PostgreSQL IOS Google Htaccess Windows Server
Make a leaderReport
D
D
dearname2015-06-06 13:17:53
Encryption
dearname, 2015-06-06 13:17:53

Encryption in sound file?

Good afternoon. There is a course topic - encryption in sound. Advise books where there is about this, and even simple algorithms. Thanks in advance!

Reply
Answer the question

Answer the question

In order to leave comments, you need to log in

0 answer(s)
Similar questions
D
DVoropaev2019-03-15 01:15:47
How are end-to-end encrypted messengers protected against man-in-the-middle attacks? 5Reply
S
Stanislav Vakhnov2016-10-20 10:14:05
How to encrypt files locally and on network storage? 2Reply
K
Kirill Zhilyaev2019-03-27 00:55:35
How does two-way asymmetric encryption work? 1Reply
A
Alexander2016-11-13 12:44:51
Is there a danger of traffic interception when working through Frigate or Browsec? 1Reply
V
Victor Marquardt2016-11-14 18:54:02
Diffie-Hellman algorithm, what should be the key length? 1Reply

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question

banners