Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Joe Rochefort's War: The Odyssey of the Codebreaker Who Outwitted Yamamoto at Midway, Author: Elliot W Carlson
Title: Real-World Cryptography, Author: David Wong
Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), Author: Mike Meyers
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: A Student's Guide to Coding and Information Theory, Author: Stefan M. Moser
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption, Author: Massimo Bertaccini
Title: Building Ethereum Dapps: Decentralized applications on the Ethereum blockchain, Author: Roberto Infante
Title: Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture, Author: Brett Crawley
Title: Cryptography for Everyone, Author: Matthew D. Green Pre-Order Now
Title: IAM & Cybersecurity: Strategies for Protecting Digital Assets, Author: Ibrahim Abdelmoneim
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: The Security Hippie, Author: Barak Engel
Explore Series
Title: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet, Author: Shawn James Rosenheim
Title: Kryptographie, Author: Jürgen Fuß
Explore Series
Title: Learn Ethereum: A practical guide to help developers set up and run decentralized applications with Ethereum 2.0, Author: Xun (Brian) Wu

Pagination Links