Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Codebreaking: A Practical Guide, Author: Elonka Dunin
Title: Battle of Wits: The Complete Story of Codebreaking in World War II, Author: Stephen Budiansky
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: Between Silk and Cyanide: A Codemaker's War, 1941-1945, Author: Leo Marks
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine / Edition 1, Author: Charles Petzold
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: See Yourself in Cyber: Security Careers Beyond Hacking, Author: Ed Adams
Title: Codebreakers' Victory: How the Allied Cryptographers Won World War II, Author: Hervie Haufler
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Fibonacci Analysis, Author: Constance Brown
Title: Blockchain in Action, Author: Bina Ramamurthy
Title: Cryptography For Dummies, Author: Chey Cobb
Title: The Cybersecurity Manager's Guide: The Art of Building Your Security Program, Author: Todd Barnum
Title: SSH, The Secure Shell: The Definitive Guide: The Definitive Guide, Author: Daniel Barrett

Pagination Links