Похожие видео
array(10) {
[0]=>
object(stdClass)#6129 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "3YBwhWuXZ0o"
["related_video_title"]=>
string(87) "DES Encryption Example | DES Example Solution | How to solve DES example? | DES Example"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(15) "Chirag Bhalodia"
}
[1]=>
object(stdClass)#6102 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "SaZGjQBItBc"
["related_video_title"]=>
string(59) "NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(24) "Sundeep Saradhi Kanthety"
}
[2]=>
object(stdClass)#6127 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4R_kocR1roM"
["related_video_title"]=>
string(34) "Multiple Encryption and Triple DES"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(12) "Neso Academy"
}
[3]=>
object(stdClass)#6134 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "HZGCoVF3YvM"
["related_video_title"]=>
string(85) "Теорема Байеса, геометрия изменения убеждений"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[4]=>
object(stdClass)#6113 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "O4xNJsjtN6E"
["related_video_title"]=>
string(60) "AES Explained (Advanced Encryption Standard) - Computerphile"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(13) "Computerphile"
}
[5]=>
object(stdClass)#6131 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "NuyzuNBFWxQ"
["related_video_title"]=>
string(51) "7 Cryptography Concepts EVERY Developer Should Know"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(8) "Fireship"
}
[6]=>
object(stdClass)#6126 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "85oMrKd8afY"
["related_video_title"]=>
string(50) "Diffie-Hellman Key Exchange: How to Share a Secret"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(13) "Spanning Tree"
}
[7]=>
object(stdClass)#6136 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4fezP875xOQ"
["related_video_title"]=>
string(59) "4 Hours Chopin for Studying, Concentration & Relaxation"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(12) "HALIDONMUSIC"
}
[8]=>
object(stdClass)#6112 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7HgAN5cEmkk"
["related_video_title"]=>
string(28) "I made the PC I couldn't buy"
["posted_time"]=>
string(24) "16 часов назад"
["channelName"]=>
string(15) "Christian Selig"
}
[9]=>
object(stdClass)#6130 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AF8LSurfct4"
["related_video_title"]=>
string(68) "Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(6) "FilFar"
}
}
DES Encryption Example | DES Example Solution | How to solve DES example? | DES Example
NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM
Multiple Encryption and Triple DES
Теорема Байеса, геометрия изменения убеждений
AES Explained (Advanced Encryption Standard) - Computerphile
7 Cryptography Concepts EVERY Developer Should Know
Diffie-Hellman Key Exchange: How to Share a Secret
4 Hours Chopin for Studying, Concentration & Relaxation
I made the PC I couldn't buy
Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠