Download PDF: https://ilyakuzovkin.com/wp-content/uploads/2017/06/Multi-armed-Bandit-Algorithms-and-Empirical-Evaluation.pdf
When encrypting binary files, especially big ones, it not sensible to use asymmetric key cryptography. This will be slow and may produce data inconsistency errors….
Download PDF: https://ilyakuzovkin.com/wp-content/uploads/2017/06/minesweeper1.pdfSource code: https://ilyakuzovkin.com/wp-content/uploads/2017/06/minesweeper1.zip
Download PDFshttps://ilyakuzovkin.com/wp-content/uploads/2017/06/sheet7.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/crypto2ex4.5.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/exercise_sheet_2.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/sheet5.pdf
Download PDFs:https://ilyakuzovkin.com/wp-content/uploads/2017/06/Cryptographic-protocols-exercise1.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Cryptographic-protocols-exercise2.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Cryptographic-protocols-exercise3.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Cryptographic-protocols-exercise4.pdf
Download PDFshttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Complexity-Theory-Lecture-1.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Complexity-Theory-Lecture-3.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Complexity-Theory-Lecture-12.pdfhttps://ilyakuzovkin.com/wp-content/uploads/2017/06/Complexity-Theory-Lecture-13.pdf
Download PDF: https://ilyakuzovkin.com/wp-content/uploads/2017/06/SQL-injection-vulnerability-in-CMS-Drupal.pdf
The goal was to transfer 120 Gb image of whole system onto new 250 Gb hard drive without reinstalling the OS.
Download PDF: https://ilyakuzovkin.com/materials/homeworks/db-theory-course-project.pdf