Title: Real-World Cryptography, Author: David Wong
Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), Author: Mike Meyers
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Kryptographie, Author: Jürgen Fuß Pre-Order Now
Title: Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography, Author: Massimo Bertaccini
Title: Joe Rochefort's War: The Odyssey of the Codebreaker Who Outwitted Yamamoto at Midway, Author: Elliot W Carlson
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: The Essential Turing, Author: B. Jack. Copeland
Title: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet, Author: Shawn James Rosenheim
Title: Practical Forensic Imaging: Securing Digital Evidence with Linux Tools, Author: Bruce Nikkel
Title: Cryptographic City: Decoding the Smart Metropolis, Author: Richard Coyne
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Learn Ethereum: A practical guide to help developers set up and run decentralized applications with Ethereum 2.0, Author: Xun (Brian) Wu
Title: Trade What You See: How To Profit from Pattern Recognition, Author: Larry Pesavento

Pagination Links