Title: What Is Computer Science?: An Information Security Perspective, Author: Daniel Page
Title: Still Searching for Satoshi: Unveiling the Blockchain Revolution, Author: Anders Lisdorf
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: The Security Hippie, Author: Barak Engel
Explore Series
Title: Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects, Author: Ed Moyle
Title: Writing Secure Code, Author: David LeBlanc
Title: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet, Author: Shawn James Rosenheim
Title: CONTEMPORARY DEVELOPMENTS IN FINITE FIELDS AND APPLICATIONS, Author: Gove Effinger
Title: Next Generation SSH2 Implementation: Securing Data in Motion, Author: Dale Liu
Explore Series
Title: The Essential John Nash, Author: John Nash
Title: Codebreaking and Signals Intelligence, Author: Christopher Andrew
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: Real-World Cryptography, Author: David Wong
Title: Learn Ethereum: A practical guide to help developers set up and run decentralized applications with Ethereum 2.0, Author: Xun (Brian) Wu
Title: Grokking Web Application Security, Author: Malcolm McDonald
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Secure APIs: Design, build, and implement, Author: José Haro Peralta Pre-Order Now

Pagination Links