Explore all books in Computers / Security / Cryptography & Encryption category
Serious Cryptography
A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson
Computers / Security / Cryptography & Encryption
Cryptography In The Information Society
Andrey Fionov , Boris Ryabko
Computers / Security / Cryptography & Encryption
Inside Cyber Warfare
Mapping the Cyber Underworld
Jeffrey Carr
Computers / Security / Cryptography & Encryption
Applied Cryptography
Protocols, Algorithms and Source Code in C
Bruce Schneier
Computers / Security / Cryptography & Encryption
Investigating Cryptocurrencies
Understanding, Extracting, and Analyzing Blockchain Evidence
Nick Furneaux
Computers / Security / Cryptography & Encryption
Security Lessons for Web App Developers – Vol I
Covers Modern Cryptography, Authentication using JSON Web Token and Web Security
Dr. Poornima G. Naik
Computers / Security / Cryptography & Encryption
Crypto
How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
Steven Levy
Computers / Security / Cryptography & Encryption
Enterprise Level Security 2
Advanced Techniques for Information Technology in an Uncertain World
Institute for Defense Analyses , Kevin E. Foltz , William R. Simpson
Computers / Security / Cryptography & Encryption
Big Data Forensics – Learning Hadoop Investigations
Joe Sremack
Computers / Security / Cryptography & Encryption
Database Anonymization
Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
David Sánchez , Jordi Soria-Comas , Josep Domingo-Ferrer
Computers / Security / Cryptography & Encryption
Crypto Wars
The Fight for Privacy in the Digital Age: A Political History of Digital Encryption
Craig Jarvis
Computers / Security / Cryptography & Encryption
Computational Number Theory
Abhijit Das
Computers / Security / Cryptography & Encryption
Kali Linux CTF Blueprints
Cameron Buchanan
Computers / Security / Cryptography & Encryption
Handbook of Formal Analysis and Verification in Cryptography
Besik Dundua , Sedat Akleylek
Computers / Security / Cryptography & Encryption
Data Acquisition Techniques Using PCs
Howard Austerlitz
Computers / Security / Cryptography & Encryption