Title: Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, Author: Christof Paar
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware, Author: Marc Weber Tobias
Title: Quantum Information Theory, Author: Mark M. Wilde
Title: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Author: Arvind Narayanan
Title: Security Yearbook 2025: A History and Directory of the IT Security Industry, Author: Richard Stiennon
Title: Cybersecurity for SAP, Author: Gaurav Singh
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice, Author: Jason Edwards
Title: Cybersecurity in Context: Technology, Policy, and Law, Author: Chris Jay Hoofnagle
Title: Innovations In Digital Forensics, Author: Suryadipta Majumdar
Title: Cyber Threat Intelligence, Author: Martin Lee
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: Cybersecurity Law, Author: Jeff Kosseff
Title: Cyber Dragon: Inside China's Information Warfare and Cyber Operations, Author: Dean Cheng
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Secret History: The Story of Cryptology, Author: Craig P. Bauer

Pagination Links