Title: Applied Cryptography using Python: Implement encryption, hashing, and cryptographic protocols securely with Python, Author: Ramesh Nagappan Pre-Order Now
Title: Cryptography for Everyone, Author: Matthew D. Green Pre-Order Now
Title: Generative AI and Digital Forensics, Author: Ravindra Das
Title: The Zero Trust Framework and Privileged Access Management (PAM), Author: Ravindra Das
Title: Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem, Author: Chris Hughes
Title: Rust for Blockchain Application Development: Learn to build decentralized applications on popular blockchain technologies using Rust, Author: Akhil Sharma
Title: Deploying the Zero Trust Framework in MSFT Azure, Author: Ravindra Das
Title: Math for Security: From Graphs and Geometry to Spatial Analysis, Author: Daniel Reilly
Title: Codebreaking: A Practical Guide, Author: Elonka Dunin
Title: Still Searching for Satoshi: Unveiling the Blockchain Revolution, Author: Anders Lisdorf
Title: Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings, Author: Melanie Volkamer
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Mastering Blockchain - Fourth Edition: Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3, Author: Imran Bashir
Title: An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection, Author: Stephan Krenn
Title: Codebreaking and Signals Intelligence, Author: Christopher Andrew
Title: Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings, Author: Robert Krimmer
Title: Secret Key Cryptography: Ciphers, from simple to unbreakable, Author: Frank Rubin
Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Computer Security: A Hands-on Approach, Author: Wenliang Du
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III

Pagination Links