ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / Cryptography & Encryption category

Serious Cryptography

A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Cryptography In The Information Society

Andrey Fionov , Boris Ryabko

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Inside Cyber Warfare

Mapping the Cyber Underworld

Jeffrey Carr

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Applied Cryptography

Protocols, Algorithms and Source Code in C

Bruce Schneier

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Investigating Cryptocurrencies

Understanding, Extracting, and Analyzing Blockchain Evidence

Nick Furneaux

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Security Lessons for Web App Developers – Vol I

Covers Modern Cryptography, Authentication using JSON Web Token and Web Security

Dr. Poornima G. Naik

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Crypto

How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

Steven Levy

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Enterprise Level Security 2

Advanced Techniques for Information Technology in an Uncertain World

Institute for Defense Analyses , Kevin E. Foltz , William R. Simpson

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Big Data Forensics – Learning Hadoop Investigations

Joe Sremack

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Database Anonymization

Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

David Sánchez , Jordi Soria-Comas , Josep Domingo-Ferrer

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Crypto Wars

The Fight for Privacy in the Digital Age: A Political History of Digital Encryption

Craig Jarvis

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Computational Number Theory

Abhijit Das

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Kali Linux CTF Blueprints

Cameron Buchanan

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Handbook of Formal Analysis and Verification in Cryptography

Besik Dundua , Sedat Akleylek

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Data Acquisition Techniques Using PCs

Howard Austerlitz

Computers / Security / Cryptography & Encryption

🥺 Not rated yet