Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Codebreaking: A Practical Guide, Author: Elonka Dunin
Title: Battle of Wits: The Complete Story of Codebreaking in World War II, Author: Stephen Budiansky
Title: Math for Security: From Graphs and Geometry to Spatial Analysis, Author: Daniel Reilly
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem, Author: Chris Hughes
Title: Between Silk and Cyanide: A Codemaker's War, 1941-1945, Author: Leo Marks
Title: The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine / Edition 1, Author: Charles Petzold
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: Codebreakers' Victory: How the Allied Cryptographers Won World War II, Author: Hervie Haufler
Title: SSH, The Secure Shell: The Definitive Guide: The Definitive Guide, Author: Daniel Barrett
Title: Blockchain in Action, Author: Bina Ramamurthy
Title: The Cybersecurity Manager's Guide: The Art of Building Your Security Program, Author: Todd Barnum
Title: Cryptography For Dummies, Author: Chey Cobb
Title: Blockchain: Blueprint for a New Economy, Author: Melanie Swan
Title: The Essential John Nash, Author: John Nash
Title: A Cryptography Primer: Secrets and Promises, Author: Philip N. Klein
Title: Cryptography Algorithms - Second Edition: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography, Author: Massimo Bertaccini

Pagination Links