Title: From Day Zero to Zero Day, Author: Eugene Lim Pre-Order Now
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan Pre-Order Now
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers, Author: Dominik Merli
Title: Grokking Web Application Security, Author: Malcolm McDonald
Title: Math for Security: From Graphs and Geometry to Spatial Analysis, Author: Daniel Reilly
Title: Cryptographic City: Decoding the Smart Metropolis, Author: Richard Coyne
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Mastering Blockchain: Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3, Author: Imran Bashir
Title: IAPP CIPM Certified Information Privacy Manager Study Guide, Author: Mike Chapple
Title: Secret Key Cryptography: Ciphers, from simple to unbreakable, Author: Frank Rubin
Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption, Author: Massimo Bertaccini
Title: The Security Hippie, Author: Barak Engel
Explore Series
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell

Pagination Links