ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / Cryptography category

Enterprise Level Security 2

Advanced Techniques for Information Technology in an Uncertain World

Institute for Defense Analyses , Kevin E. Foltz , William R. Simpson

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

The Mathematics of Secrets

Cryptography from Caesar Ciphers to Digital Encryption

Joshua Holden

Computers / Security / Cryptography

🥺 Not rated yet

Big Data Forensics – Learning Hadoop Investigations

Joe Sremack

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Database Anonymization

Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

David Sánchez , Jordi Soria-Comas , Josep Domingo-Ferrer

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Crypto Wars

The Fight for Privacy in the Digital Age: A Political History of Digital Encryption

Craig Jarvis

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Computational Number Theory

Abhijit Das

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Kali Linux CTF Blueprints

Cameron Buchanan

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Handbook of Formal Analysis and Verification in Cryptography

Besik Dundua , Sedat Akleylek

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Agrawal, Dharma P. , Gupta, Brij , Yamaguchi, Shingo

Computers / Security / Cryptography

🥺 Not rated yet

Theory and Practice of Cryptography Solutions for Secure Information Systems

Elçi, Atilla

Computers / Security / Cryptography

🥺 Not rated yet

TLS Mastery: Tux Edition

Michael W Lucas

Computers / Security / Cryptography

🥺 Not rated yet

Bitcoin And Cryptocurrency Technologies

4 Manuscripts - Bitcoin Explained, Blockchain Revolution, Ethereum Blockchain AND Cryptocurrency Blockchain Explained

Christopher Blackburn

Computers / Security / Cryptography

🥺 Not rated yet

Data Acquisition Techniques Using PCs

Howard Austerlitz

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Crypto

How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

Steven Levy

Computers / Security / Cryptography & Encryption

🥺 Not rated yet

Security without Obscurity

Frequently Asked Questions (FAQ)

Jeff Stapleton

Computers / Security / Cryptography & Encryption

🥺 Not rated yet