Title: Kryptographie, Author: Jürgen Fuß
Explore Series
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Security-System Engineering: Ein Ansatz zu den Grundlagen der Informationssicherheit, Author: Bernhard Barz
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision, Author: Nikolay Matveev
Title: Redefining Information Security: How to Build a Security-Driven Organization, Author: Brian Wagner
Title: Privileged Access Management: Strategies for Zero Trust in the Enterprise, Author: Gregory C. Rasner
Title: Penetrationstests erfolgreich umsetzen: Praxisleitfaden - Regulatorik - KI-Einflüsse, Author: Nina Wagner
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Microsoft Security Copilot: Master strategies for AI-driven cyber defense, Author: Bi Yue Xu
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos
Title: Blockchain Platforms: A Look at the Underbelly of Distributed Platforms, Author: Stijn Van Hijfte
Title: Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität, Author: Thomas H. Lenhard