Data Integrity Courses
Ben Eater via YouTube How Cyclic Redundancy Checks (CRCs) Work - Error Detection in Data Transmission
Ben Eater via YouTube Checksums and Hamming Distance - Error Detection in Data Transmission
Ben Eater via YouTube Error Detection: Parity Checking
Ben Eater via YouTube Rock Salt - A Method for Securely Storing and Utilizing Password Validation Data
BSidesLV via YouTube What Really Happens When Hackers Attack Medical Devices
RSA Conference via YouTube Secure Channels - Building Real World Crypto Systems
BruCON Security Conference via YouTube Building Real-time Systems with Open Source Technologies
Strange Loop Conference via YouTube Where's the Rest of the Data Iceberg?
TED via YouTube Energy Fraud and Blackouts - Issues with Wireless Metering Protocols
Black Hat via YouTube