Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Codebreaking: A Practical Guide, Author: Elonka Dunin
Title: Battle of Wits: The Complete Story of Codebreaking in World War II, Author: Stephen Budiansky
Title: Math for Security: From Graphs and Geometry to Spatial Analysis, Author: Daniel Reilly
Title: The American Black Chamber, Author: Herbert O. Yardley
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: Cryptography for Everyone, Author: Matthew D. Green Pre-Order Now
Title: Secret Key Cryptography: Ciphers, from simple to unbreakable, Author: Frank Rubin
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), Author: Mike Meyers
Title: The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine, Author: Charles Petzold
Title: Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem, Author: Chris Hughes
Title: The Essential John Nash, Author: John Nash
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: Blockchain in Action, Author: Bina Ramamurthy
Title: Between Silk and Cyanide: A Codemaker's War, 1941-1945, Author: Leo Marks
Title: Cryptography For Dummies, Author: Chey Cobb
Title: Manual básico de criptología, Author: Luis Hernandez Encinas
Title: The Cybersecurity Manager's Guide: The Art of Building Your Security Program, Author: Todd Barnum
Title: Super Secreto - The Third Epoch of Cryptography: Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone, Author: Theo Tenzer

Pagination Links