Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: IAPP CIPM Certified Information Privacy Manager Study Guide, Author: Mike Chapple
Title: Deciphering the Rising Sun: Navy and Marine Corps Codebreakers, Translators, and Interpreters in the Pacific War, Author: Roger Dingman USNR (Ret.)
Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Joe Rochefort's War: The Odyssey of the Codebreaker Who Outwitted Yamamoto at Midway, Author: Elliot W Carlson
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Mastering Blockchain: Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3, Author: Imran Bashir
Title: Cryptographic City: Decoding the Smart Metropolis, Author: Richard Coyne
Title: Math for Security: From Graphs and Geometry to Spatial Analysis, Author: Daniel Reilly
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: SSH, the Secure Shell: The Definitive Guide, Author: Daniel J. Barrett
Title: The Security Hippie, Author: Barak Engel
Explore Series
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: DEMYSTIFYING COMPUTATION: A HANDS-ON INTRODUCTION: A Hands-On Introduction, Author: Apostolos Syropoulos
Title: Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers, Author: Dominik Merli
Title: Java Cryptography, Author: Jonathan Knudsen
Explore Series
Title: The Cybersecurity Manager's Guide, Author: Todd Barnum

Pagination Links