ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / Cryptography category

The CISO Evolution

Business Knowledge for Cybersecurity Executives

Kyriakos Lambros , Matthew K. Sharp

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Unsolved!

The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies

Craig P. Bauer

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Secret History

The Story of Cryptology

Craig P. Bauer

Computers / Security / Cryptography

🥺 Not rated yet

Serious Cryptography

A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Cryptography In The Information Society

Andrey Fionov , Boris Ryabko

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Inside Cyber Warfare

Mapping the Cyber Underworld

Jeffrey Carr

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Applied Cryptography

Protocols, Algorithms and Source Code in C

Bruce Schneier

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Investigating Cryptocurrencies

Understanding, Extracting, and Analyzing Blockchain Evidence

Nick Furneaux

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Security Lessons for Web App Developers – Vol I

Covers Modern Cryptography, Authentication using JSON Web Token and Web Security

Dr. Poornima G. Naik

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Crypto

How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

Steven Levy

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Enterprise Level Security 2

Advanced Techniques for Information Technology in an Uncertain World

Institute for Defense Analyses , Kevin E. Foltz , William R. Simpson

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

The Mathematics of Secrets

Cryptography from Caesar Ciphers to Digital Encryption

Joshua Holden

Computers / Security / Cryptography

🥺 Not rated yet

Big Data Forensics – Learning Hadoop Investigations

Joe Sremack

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Database Anonymization

Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

David Sánchez , Jordi Soria-Comas , Josep Domingo-Ferrer

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Crypto Wars

The Fight for Privacy in the Digital Age: A Political History of Digital Encryption

Craig Jarvis

Computers / Security / Cryptography & Encryption

🥺 Not rated yet