Explore all books in Computers / Security / Cryptography category
Enterprise Level Security 2
Advanced Techniques for Information Technology in an Uncertain World
Institute for Defense Analyses , Kevin E. Foltz , William R. Simpson
Computers / Security / Cryptography & Encryption
The Mathematics of Secrets
Cryptography from Caesar Ciphers to Digital Encryption
Joshua Holden
Computers / Security / Cryptography
Big Data Forensics – Learning Hadoop Investigations
Joe Sremack
Computers / Security / Cryptography & Encryption
Database Anonymization
Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
David Sánchez , Jordi Soria-Comas , Josep Domingo-Ferrer
Computers / Security / Cryptography & Encryption
Crypto Wars
The Fight for Privacy in the Digital Age: A Political History of Digital Encryption
Craig Jarvis
Computers / Security / Cryptography & Encryption
Computational Number Theory
Abhijit Das
Computers / Security / Cryptography & Encryption
Kali Linux CTF Blueprints
Cameron Buchanan
Computers / Security / Cryptography & Encryption
Handbook of Formal Analysis and Verification in Cryptography
Besik Dundua , Sedat Akleylek
Computers / Security / Cryptography & Encryption
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Agrawal, Dharma P. , Gupta, Brij , Yamaguchi, Shingo
Computers / Security / Cryptography
Theory and Practice of Cryptography Solutions for Secure Information Systems
Elçi, Atilla
Computers / Security / Cryptography
TLS Mastery: Tux Edition
Michael W Lucas
Computers / Security / Cryptography
Bitcoin And Cryptocurrency Technologies
4 Manuscripts - Bitcoin Explained, Blockchain Revolution, Ethereum Blockchain AND Cryptocurrency Blockchain Explained
Christopher Blackburn
Computers / Security / Cryptography
Data Acquisition Techniques Using PCs
Howard Austerlitz
Computers / Security / Cryptography & Encryption
Crypto
How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
Steven Levy
Computers / Security / Cryptography & Encryption
Security without Obscurity
Frequently Asked Questions (FAQ)
Jeff Stapleton
Computers / Security / Cryptography & Encryption