Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: IAPP CIPM Certified Information Privacy Manager Study Guide, Author: Mike Chapple
Title: Deciphering the Rising Sun: Navy and Marine Corps Codebreakers, Translators, and Interpreters in the Pacific War, Author: Roger Dingman USNR (Ret.)
Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Joe Rochefort's War: The Odyssey of the Codebreaker Who Outwitted Yamamoto at Midway, Author: Elliot W Carlson
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: SSH, the Secure Shell: The Definitive Guide, Author: Daniel J. Barrett
Title: The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of American Codebreaking, Author: David Kahn
Title: Math for Security: From Graphs and Geometry to Spatial Analysis, Author: Daniel Reilly
Title: Blockchain with Hyperledger Fabric: Build decentralized applications using Hyperledger Fabric 2, Author: Nitin Gaur
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: The Security Hippie, Author: Barak Engel
Explore Series
Title: Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers, Author: Dominik Merli
Title: The Essential Turing, Author: B. J. Copeland
Title: Secret Key Cryptography: Ciphers, from simple to unbreakable, Author: Frank Rubin
Title: Trade What You See: How To Profit from Pattern Recognition, Author: Larry Pesavento
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp

Pagination Links