ePrivacy and GPDR Cookie Consent by Cookie Consent

If you can't find an already rated book, you can rate a new one here.

Explore all books in Computers / Security / Cryptography category

SUPER SECRETO - The Third Epoch of Cryptography

Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone

Theo Tenzer

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Principles of Blockchain Systems

Antonio Fernández Anta, Chryssis Georgiou, Maria Potop-Butucaru, Maurice Herlihy

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Metaverse Crypto For Beginners

Adidas Wilson

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Secure Searchable Encryption and Data Management

Brij B. Gupta, Mamta

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

PKI Tutorials - Herong's Tutorial Examples

Dr. Herong Yang

Computers / Security / Cryptography
🥺 Not rated yet

The CISO Evolution

Business Knowledge for Cybersecurity Executives

Kyriakos Lambros, Matthew K. Sharp

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Bitcoin Explained

Beginner’s Guide To Understanding Bitcoin

Christopher Blackburn

Computers / Security / Cryptography
🥺 Not rated yet

Cryptoreality

A Conversation with Artur Ekert

Howard Burton

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

A Mind Friendly Guide to Blockchain and Digital Currencies

Ashraf Kotb

Computers / Security / Cryptography
🥺 Not rated yet

Cryptography, Information Theory, and Error-Correction

A Handbook for the 21st Century

Aiden A. Bruen, James M. McQuillan, Mario A. Forcinito

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Trust in Computer Systems and the Cloud

Mike Bursell

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Corporate Cybersecurity

Identifying Risks and the Bug Bounty Program

John Jackson

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

Tribe of Hackers Blue Team

Tribal Knowledge from the Best in Defensive Cybersecurity

Jennifer Jin, Marcus J. Carey

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

An In-Depth Guide to Mobile Device Forensics

Chuck Easttom

Computers / Security / Cryptography & Encryption
🥺 Not rated yet

TLS Mastery: Beastie Edition

Michael W Lucas

Computers / Security / Cryptography
🥺 Not rated yet