Title: Cryptography for Everyone, Author: Matthew D. Green Pre-Order Now
Title: Foundations of Cybersecurity, 2nd Edition: A Straightforward Introduction, Author: Jason Andress Pre-Order Now
Title: Secure APIs: Design, build, and implement, Author: José Haro Peralta
Title: Kryptographie, Author: Jürgen Fuß
Explore Series
Title: Blockchain Platforms: A Look at the Underbelly of Distributed Platforms, Author: Stijn Van Hijfte
Title: Security-System Engineering: Ein Ansatz zu den Grundlagen der Informationssicherheit, Author: Bernhard Barz
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision, Author: Nikolay Matveev
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Privileged Access Management: Strategies for Zero Trust in the Enterprise, Author: Gregory C. Rasner
Title: Microsoft Security Copilot: Master strategies for AI-driven cyber defense, Author: Bi Yue Xu
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos
Title: Penetrationstests erfolgreich umsetzen: Praxisleitfaden - Regulatorik - KI-Einflüsse, Author: Nina Wagner
Title: Redefining Information Security: How to Build a Security-Driven Organization, Author: Brian Wagner
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität, Author: Thomas H. Lenhard
Title: Gamified Tabletop Exercises for Effective Disaster Recovery Testing: Preparing for Disasters with Dice, Author: John Svazic
Title: Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam, Author: Laurie Yiu-Chung Lau
Title: Securing the Digital Frontier: Cyber Security for Responsible Citizens and Strategic Thinkers, Author: Andrew Martin
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing

Pagination Links