Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition, Author: James M. Adcock
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Computer Security: Art and Science, Author: Matt Bishop
Title: Software Security: Concepts & Practices, Author: Suhel Ahmad Khan
Title: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, Author: Cynthia Brumfield
Title: Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®, Author: Susan Hansche
Title: Selected Areas in Cryptography - SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, Author: Carlos Cid
Title: Foundations of Cryptography: Volume 2, Basic Applications, Author: Oded Goldreich
Title: Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part I, Author: Ruben Niederhagen
Title: Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings, Author: Lejla Batina
Title: Dynamic Police Training, Author: Ann R. Bumbak
Title: Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part IV, Author: Serge Fehr
Title: Graphical Models for Security: 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers, Author: Massimiliano Albanese
Title: Handbook of Big Data and IoT Security, Author: Ali Dehghantanha
Title: Big Data, Data Mining and Data Science: Algorithms, Infrastructures, Management and Security, Author: George Dimitoglou
Title: Unleashing the Power of Blockchain and IoT for Water Informatics, Author: Sur Singh Rawat
Title: Introduction to Certificateless Cryptography, Author: Hu Xiong
Title: Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line, Author: Paul Troncone
Title: Risks and Security of Internet and Systems: 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings, Author: Simon Collart-Dutilleul

Pagination Links