Title: Code: The Hidden Language of Computer Hardware and Software, Author: Charles Petzold
Title: Codebreaking: A Practical Guide, Author: Elonka Dunin
Title: Battle of Wits: The Complete Story of Codebreaking in World War II, Author: Stephen Budiansky
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: Codebreakers' Victory: How the Allied Cryptographers Won World War II, Author: Hervie Haufler
Title: Between Silk and Cyanide: A Codemaker's War, 1941-1945, Author: Leo Marks
Title: The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine / Edition 1, Author: Charles Petzold
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: The Comanche Code Talkers of World War II / Edition 1, Author: William C. Meadows
Title: Blockchain in Action, Author: Bina Ramamurthy
Title: Cryptography For Dummies, Author: Chey Cobb
Title: The Cybersecurity Manager's Guide: The Art of Building Your Security Program, Author: Todd Barnum
Title: SSH, The Secure Shell: The Definitive Guide: The Definitive Guide, Author: Daniel Barrett
Title: Blockchain: Blueprint for a New Economy, Author: Melanie Swan
Title: Practical Forensic Imaging: Securing Digital Evidence with Linux Tools, Author: Bruce Nikkel
Title: Archaeology of Algorithmic Artefacts, Author: David Link
Title: The Essential John Nash, Author: John Nash
Title: Secret Key Cryptography: Ciphers, from simple to unbreakable, Author: Frank Rubin

Pagination Links