SlideShare a Scribd company logo
TranspositionTransposition
CipherCipher
A . Antony Alex MCA
Dr G R D College of Science – CBE
Tamil Nadu - India
KeywordsKeywords
Cryptography
EncryptionEncryption
Decryption
Cipher
In cryptography, a TRANSPOSITION CIPHER is
a method of encryption by which the
positions held by units of plaintext are
shifted according to a regular system, soshifted according to a regular system, so
that the ciphertext constitutes a
permutation of the plaintext.
The order of the units is changed.
Mathematically a bijective function is used
on the characters' positions to encrypt
and an inverse function to decrypt.and an inverse function to decrypt.
Most Common GameMost Common Game --
AnagramAnagram
TSPSH ALSIS EASAM GIMEE
THIS IS A SAMPLE MESSAGE
Rail Fence cipher
Route cipher
Columnar transpositionColumnar transposition
Double transposition
Myszkowski transposition
Rail Fence cipherRail Fence cipher
Route cipherRoute cipher
Columnar transpositionColumnar transposition
ZEBRAS
"6 3 2 4 1 5“
EVLNA CDTES EAROF ODEEC WIREE
Double transpositionDouble transposition
STRIPE
"564231“
CAEEN SOIAE DRLEF WEDRE EVTOC
Myszkowski transpositionMyszkowski transposition
TOMATO
532164
TOMATO
432143
ROFOA CDTED SEEEA CWEIV RLENE
Break Columnar TranspositionBreak Columnar Transposition
CipherCipher
Cryptanalyst must be aware that he is
dealing with cipher
Frequency of E,T,A,O,I,N, etcFrequency of E,T,A,O,I,N, etc
No of Columns
Suspect
Assumption
OneOne--Time PadsTime Pads
Random Bit String
Converting plain text to bit String
◦ Converting plant text into its ASCII Representation
• EXCLUSIVE OR of two string
DisadvantageDisadvantage
• Key cannot be memorized – written
• The amount of data is limited to key available
• Sensitivity
Can de advantage in computers
Using storage devices along with huge data for
key transporting.
THANK U………….THANK U………….

More Related Content

What's hot

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
Aswathi Nair
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Cryptography
Cryptography Cryptography
Cryptography
Karwan Mustafa Kareem
 
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
Ajay AJ
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
Farah Shaikh
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 

What's hot (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphersIntroduction to cryptography and types of ciphers
Introduction to cryptography and types of ciphers
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
Kerberos
KerberosKerberos
Kerberos
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Monoalphabetic Substitution Cipher
Monoalphabetic Substitution  CipherMonoalphabetic Substitution  Cipher
Monoalphabetic Substitution Cipher
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 

Viewers also liked

Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Columnar transposition cipher
Columnar transposition cipherColumnar transposition cipher
Columnar transposition cipher
Waqar Memon
 
ความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูล
ความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูลความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูล
ความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูล
tumetr1
 
Transposition
TranspositionTransposition
Transposition
Intellectual Look
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Rail-Fence Cipher Presentation
Rail-Fence Cipher PresentationRail-Fence Cipher Presentation
Rail-Fence Cipher Presentation
MBrems
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Ramadhi Irawan
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Ch3
Ch3Ch3
Konsep kriptografi
Konsep kriptografiKonsep kriptografi
Konsep kriptografi
Arya Sasmita
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
Shafiqah Emilia
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
eSAT Journals
 
Kriptografi
KriptografiKriptografi
Kriptografi
likut101010
 
Cryptography
CryptographyCryptography
Cryptography
fsl khan
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
phanleson
 
Jericho Christian Academy Marketing 1[1]
Jericho Christian Academy Marketing 1[1]Jericho Christian Academy Marketing 1[1]
Jericho Christian Academy Marketing 1[1]
vbowens
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
Agung Julisman
 
Substitution cipher
Substitution cipher Substitution cipher
Substitution cipher
Shafiqah Emilia
 

Viewers also liked (20)

Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Columnar transposition cipher
Columnar transposition cipherColumnar transposition cipher
Columnar transposition cipher
 
ความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูล
ความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูลความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูล
ความรู้พื้นฐานเกี่ยวกับการเข้ารหัสข้อมูล
 
Transposition
TranspositionTransposition
Transposition
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Rail-Fence Cipher Presentation
Rail-Fence Cipher PresentationRail-Fence Cipher Presentation
Rail-Fence Cipher Presentation
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Ch3
Ch3Ch3
Ch3
 
Konsep kriptografi
Konsep kriptografiKonsep kriptografi
Konsep kriptografi
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
Cryptography
CryptographyCryptography
Cryptography
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 
Jericho Christian Academy Marketing 1[1]
Jericho Christian Academy Marketing 1[1]Jericho Christian Academy Marketing 1[1]
Jericho Christian Academy Marketing 1[1]
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
Substitution cipher
Substitution cipher Substitution cipher
Substitution cipher
 

Similar to Transposition cipher

Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 
Cryptography
CryptographyCryptography
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
eSAT Journals
 
Cyber security
Cyber securityCyber security
Cyber security
SAKSHIMAHADIK
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
eSAT Publishing House
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
KaushikRamabhotla
 
Cryptography using probability
Cryptography using probabilityCryptography using probability
Cryptography using probability
Prankit Mishra
 
Classic Cryptography
Classic CryptographyClassic Cryptography
Classic Cryptography
Wonjun Hwang
 
Transposition cipher - Network Security.ppt
Transposition cipher - Network Security.pptTransposition cipher - Network Security.ppt
Transposition cipher - Network Security.ppt
the9amit
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
Somaditya Basak
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM
 
622 Crypto Presentattion.pptx
622 Crypto Presentattion.pptx622 Crypto Presentattion.pptx
622 Crypto Presentattion.pptx
SUFFOCATETHEKISO
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
GauriBornare1
 
Cryptography
CryptographyCryptography
Cryptography
Pratiksha Patil
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
desalewminale
 
Cryptography CET 2.pptx
Cryptography CET 2.pptxCryptography CET 2.pptx
Cryptography CET 2.pptx
jhonmacchony
 

Similar to Transposition cipher (20)

Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Cyber security
Cyber securityCyber security
Cyber security
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Cryptography using probability
Cryptography using probabilityCryptography using probability
Cryptography using probability
 
Classic Cryptography
Classic CryptographyClassic Cryptography
Classic Cryptography
 
Transposition cipher - Network Security.ppt
Transposition cipher - Network Security.pptTransposition cipher - Network Security.ppt
Transposition cipher - Network Security.ppt
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Transposition cipher techniques
Transposition cipher techniquesTransposition cipher techniques
Transposition cipher techniques
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
622 Crypto Presentattion.pptx
622 Crypto Presentattion.pptx622 Crypto Presentattion.pptx
622 Crypto Presentattion.pptx
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Cryptography CET 2.pptx
Cryptography CET 2.pptxCryptography CET 2.pptx
Cryptography CET 2.pptx
 

More from Antony Alex

Topdown parsing
Topdown parsingTopdown parsing
Topdown parsing
Antony Alex
 
Textile management system review iii
Textile management system   review iiiTextile management system   review iii
Textile management system review iii
Antony Alex
 
Sound
SoundSound
Software project management requirements analysis
Software project management requirements analysisSoftware project management requirements analysis
Software project management requirements analysis
Antony Alex
 
Site map & web
Site map & webSite map & web
Site map & web
Antony Alex
 
Review ii
Review iiReview ii
Review ii
Antony Alex
 
Installing windows xp
Installing windows xpInstalling windows xp
Installing windows xp
Antony Alex
 
Application express
Application expressApplication express
Application express
Antony Alex
 
Android
AndroidAndroid
Android
Antony Alex
 
Weka
WekaWeka

More from Antony Alex (10)

Topdown parsing
Topdown parsingTopdown parsing
Topdown parsing
 
Textile management system review iii
Textile management system   review iiiTextile management system   review iii
Textile management system review iii
 
Sound
SoundSound
Sound
 
Software project management requirements analysis
Software project management requirements analysisSoftware project management requirements analysis
Software project management requirements analysis
 
Site map & web
Site map & webSite map & web
Site map & web
 
Review ii
Review iiReview ii
Review ii
 
Installing windows xp
Installing windows xpInstalling windows xp
Installing windows xp
 
Application express
Application expressApplication express
Application express
 
Android
AndroidAndroid
Android
 
Weka
WekaWeka
Weka
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

Transposition cipher