Skip to main content
Perlego
Browse
Institutions
Pricing
Login
DeutschEnglishEspañolFrançaisItaliano
DeutschEnglishEspañolFrançaisItaliano

Browse by topic

  • Architecture
  • Art
  • Biological Sciences
  • Business
  • Computer Science
  • Design
  • Economics
  • Education
  • History
  • Languages & Linguistics
  • Law
  • Literature
  • Mathematics
  • Media & Performing Arts
  • Medicine
  • Personal Development
  • Philosophy
  • Physical Sciences
  • Politics & International Relations
  • Psychology
  • Social Sciences
  • Study Aids
  • Technology & Engineering
  • Theology & Religion

Or browse by

  • Subtopics
  • Publishers
  • Index

Browse study resources

  • Knowledge Base
  • Study Guides
  • Essay Writing Guides
  1. Home
  2. Browse
  3. Computer Science
  4. Cryptography
Computer Science

Cryptography

  • Explore
  • Books
  • Related topics

Find by topic

1 of 14
  1. Application Development
  2. Artificial Intelligence (AI) & Semantics
  3. Bioinformatics
  4. CAD-CAM
  5. Certification Guides in Computer Science
  6. Client-Server Computing
  7. Cloud Computing
  8. Compilers
  9. Computer Engineering
  10. Computer Graphics
  11. Computer Networking
  12. Computer Science General
  13. Computer Vision & Pattern Recognition
  14. Content Management Systems
  15. Cyber Security
  16. Data Mining
  17. Data Modelling & Design
  18. Data Processing
  19. Data Transmission Systems
  20. Data Visualisation
  21. Data Warehousing
  22. Databases
  23. Desktop Applications
  24. Digital Media
  25. Entreprise Applications
  26. Hardware
  27. Home Automation
  28. Human-Computer Interaction
  29. Information Technology
  30. MCSE
  31. Microsoft Programming
  32. Natural Language Processing
  33. Neural Networks
  34. Object Oriented Programming
  35. Open Source Programming
  36. Operating Systems
  37. Optical Data Processing
  38. Parallel Programming
  39. Programming
  40. Programming Algorithms
View all

Trending on Perlego

1 of 8
  1. Turkish Counterterrorism Strategy against the PKK
    Turkish Counterterrorism Strategy against the PKK
    2025
  2. Computer System and Network Security
    Computer System and Network Security
    Gregory B. White, Eric A. Fisch, Udo W. Pooch
    2017
  3. Algebraic and Stochastic Coding Theory
    Algebraic and Stochastic Coding Theory
    Dave K. Kythe, Prem K. Kythe
    2017
  4. Cyber Security and Digital Forensics
    2022
  5. Quantum Unmanned Aerial Vehicle
    2025
  6. Psybersecurity
    2024
  7. Artificial Intelligence Technology in Healthcare
    2024
  8. Security Issues and Privacy Concerns in Industry 4.0 Applications
    Shibin David, R. S. Anand, V. Jeyakrishnan, M. Niranjanamurthy
    2021
  9. Communication System Security
    Lidong Chen, Guang Gong
    2012
  10. Handbook of Security, Quantum Computing and Internet of Things
    2026
  11. Completely Regular Codes in Distance Regular Graphs
    2025
  12. Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities
    2025
  13. Attack-and-Defense Games for Control Systems
    Huanhuan Yuan, Yuan Yuan, Huapeng Dong, Yuanqing Xia, Mengbi Wang
    2024
  14. Cybersecurity in the Transportation Industry
    2024
  15. Automated Secure Computing for Next-Generation Systems
    2023
  16. Privacy Preservation of Genomic and Medical Data
    2023
  17. Democratizing Cryptography
    2022
  18. Optical Coding Theory with Prime
    Wing C. Kwong, Guu-Chang Yang
    2018
  19. Elements of Quasigroup Theory and Applications
    Victor Shcherbacov
    2017
  20. Electromagnetic Compatibility
    David A. Weston
    2016
  21. Security and Policy Driven Computing
    Lei Liu
    2016
  22. Data Protection and Security for Personal Computers
    R. Schifreen
    2014

Most popular on Perlego

1 of 20
  1. Security for Software Engineers
    Security for Software Engineers
    James N. Helfrich
    2018
  2. The Code of Honor
    The Code of Honor
    Paul J. Maurer, Ed Skoudis
    2024
  3. DeFi and the Future of Finance
    DeFi and the Future of Finance
    Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
    2021
  4. Mastering Blockchain
    Imran Bashir
    2023
  5. Bitcoin and Cryptocurrency Technologies
    Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder
    2016
  6. Effective Vulnerability Management
    Chris Hughes, Nikki Robinson
    2024
  7. Mastering Blockchain
    Imran Bashir
    2020
  8. Hands on Hacking
    Matthew Hickey, Jennifer Arcuri
    2020
  9. Advanced Cybersecurity Technologies
    Ralph Moseley
    2021
  10. Behavioral Cybersecurity
    Wayne Patterson, Cynthia E. Winston-Proctor
    2020
  11. Blockchain and the Law
    Primavera De Filippi, Aaron Wright, Primavera De Filippi De Filippi
    2018
  12. Cybersecurity for 2025
    Azhar ul Haque Sario
    2025
  13. Embedded Cryptography 1
    Emmanuel Prouff, Guenael Renault, Mattieu Rivain, Colin O'Flynn
    2025
  14. CCSP For Dummies
    Arthur J. Deane
    2023
  15. PCI Compliance
    Branden Williams, James Adamson, Branden R Williams
    2022
  16. ISO 27001 Annex A Controls in Plain English
    Dejan Kosutic
  17. The CISO Evolution
    Matthew K. Sharp, Kyriakos Lambros
    2022
  18. Cryptography
    Douglas Robert Stinson, Maura Paterson
    2018
  19. Applied Cryptography
    Bruce Schneier
    2017
  20. Real-World Cryptography
    David Wong
    2021
  21. An Introduction to Number Theory with Cryptography
    James Kraft, Lawrence Washington
    2018
  22. How to Measure Anything in Cybersecurity Risk
    Douglas W. Hubbard, Richard Seiersen
    2023
  23. Alice and Bob Learn Application Security
    Tanya Janca
    2020
  24. Cyber Security Foundations
    Keith Martin, Konstantinos Mersinas, Guido Schmitz, Jassim Happa
    2025
  25. Cryptography Algorithms
    Massimo Bertaccini
    2024
  26. Cryptography, Information Theory, and Error-Correction
    Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan
    2021
  27. Designing Secure Systems
    Michael Melone
    2021
  28. A Practical Introduction to Enterprise Network and Security Management
    Bongsik Shin
    2021
  29. Dark Territory
    Fred Kaplan
    2016
  30. Cybersecurity in Context
    Chris Jay Hoofnagle, Golden G. Richard, III
    2024
  31. CISM Certified Information Security Manager Study Guide
    Mike Chapple
    2022
  32. Quantum Information Theory
    Mark M. Wilde
    2017
  33. Quantum Computing for Computer Scientists
    Noson S. Yanofsky, Mirco A. Mannucci
    2008
  34. Decentralizing Finance
    Kenneth Bok
    2024
  35. Blue Fox
    Maria Markstedter
    2023
  36. Incident Response with Threat Intelligence
    Roberto Martinez
    2022
  37. Python for Cybersecurity
    Howard E. Poston, III
    2022
  38. Emerging Technologies in Computing
    Pramod Kumar, Anuradha Tomar, R. Sharmila
    2021
  39. An In-Depth Guide to Mobile Device Forensics
    Chuck Easttom
    2021
  40. The NFT Handbook
    Matt Fortnow, QuHarrison Terry
    2021
  41. Privacy, Regulations, and Cybersecurity
    Chris Moschovitis
    2021
  42. Practical Cybersecurity Architecture
    Ed Moyle, Diana Kelley
    2020
  43. Cybersecurity Attacks – Red Team Strategies
    Johann Rehberger
    2020
  44. Cyber Warfare – Truth, Tactics, and Strategies
    Dr. Chase Cunningham
    2020
  45. Blockchain for Distributed Systems Security
    Sachin Shetty, Charles A. Kamhoua, Laurent L. Njilla
    2019
  46. Security and Privacy in Cyber-Physical Systems
    Houbing Song, Glenn A. Fink, Sabina Jeschke
    2017
  47. Computer Security Literacy
    Douglas Jacobson, Joseph Idziorek
    2016
  48. Introduction to Number Theory
    Anthony Vazzana, David Garth
    2015
  49. The Art of Memory Forensics
    Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
    2014
  50. Introduction to Computer and Network Security
    Richard R. Brooks
    2013
  51. Investigating Cryptocurrencies
    Nick Furneaux
    2018
  52. Open-Source Security Operations Center
    Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar
    2024
  53. Blue Fox
    Maria Markstedter
    2023
  54. Cyberspace, Data Analytics, and Policing
    David Skillicorn
    2021
  55. Tribe of Hackers Blue Team
    Marcus J. Carey, Jennifer Jin
    2020
  56. The Cybersecurity Body of Knowledge
    Daniel Shoemaker, Anne Kohnke, Ken Sigler
    2020
  57. Cryptography Apocalypse
    Roger A. Grimes
    2019
  58. Cyber-Vigilance and Digital Trust
    Wiem Tounsi
    2019
  59. Practical Cyber Intelligence
    Wilson Bautista
    2018
  60. Secure Multiparty Computation and Secret Sharing
    Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen
    2015
View all

Recently published

1 of 20
  1. Cybersecurity for 2025
    Cybersecurity for 2025
    Azhar ul Haque Sario
    2025
  2. Spies, Lies, and Cybercrime
    Spies, Lies, and Cybercrime
    Eric O'Neill
    2025
  3. Becoming Quantum Safe
    Becoming Quantum Safe
    Jai Singh Arun, Ray Harishankar, Walid Rjaibi
    2025
  4. Forensic Investigation of Smart Digital Devices
    Farkhund Iqbal
    2026
  5. Cybercrime and Digital Security
    Mayank Bhushan, Dr. Aatif Jamshed
    2025
  6. Digital Forensics in Next-Generation Internet of Medical Things
    2025
  7. Turkish Counterterrorism Strategy against the PKK
    2025
  8. Cloud Computing Security
    Neha Agrawal, Rohit Kumar, Shashikala Tapaswi
    2025
  9. The CISO 3.0
    Walt Powell
    2025
  10. Cyber Risk Management in Practice
    Carlos Morales
    2025
  11. Cybersecurity Risk Management
    Jayet Moon, Jeet Shah
    2026
  12. Adversarial Machine Learning
    Jason Edwards
    2026
  13. Cybersecurity and Ethics
    Murthy V. Rallapalli
    2026
  14. Security Engineering
    Harvinder Singh Gill
    2025
  15. Mathematics for the Digital Systems Engineer
    Chris J. Mitchell
    2025
  16. Identity Security for Software Development
    Aiyan Ma
    2025
  17. Mastering Cybersecurity
    Akashdeep Bhardwaj
    2025
  18. Edge Intelligence and Analytics for Internet of Things
    2025
  19. Traditional vs Generative AI Pentesting
    Yassine Maleh
    2025
  20. Ultimate Event-Driven Architecture with Python and Apache Kafka
    Gopal Sharma
    2025
  21. Quantum Unmanned Aerial Vehicle
    2025
  22. Digital Twin Technology for Better Health
    2025
  23. Biometric Technology and Authentication
    Ravi Das
    2025
  24. The NIST 2.0 Cybersecurity Framework
    Cynthia Brumfield
    2026
  25. Wallets Demystified
    T.S Avini
    2026
  26. Cumulative Effect
    Vladas Leonas
    2026
  27. Handbook of Security, Quantum Computing and Internet of Things
    2026
  28. CyberSentinel+
    Akshay Mudgal
    2026
  29. Beyond The Invisible Nexus
    Akashdeep Bhardwaj, Saksham Garg
    2026
  30. Blueprint for Applied Subatomic Computing in 2026
    Azhar ul Haque Sario
    2026
  31. Cybersecurity Hyperglossary
    Gary Hinson, Dr. Gary Hinson, MBA
    2026
  32. Red Team Evaluation Framework
    Matthias Muhlert
    2026
  33. Transforming Cybersecurity with Machine Learning
    Kutub Thakur, Al-Sakib Khan Pathan
    2025
  34. Zero Trust Security Engineering
    Mahesh Patil
    2025
  35. Operation Carder Kaos
    Richard K. LaTulip
    2025
  36. The Cybersecurity Game Master
    Roberto Dillon
    2025
  37. Lessons from the Frontlines
    Assaf Keren
    2025
  38. Generative AI for Cybersecurity and Privacy
    2025
  39. Internet of Things Security
    2025
  40. Safeguarding Satellite Communications
    Jianping An, Shuai Wang, Pingyue Yue, Gaofeng Pan
    2025
  41. Cyber Security, Forensics and National Security
    2025
  42. Certified Penetration Testing Professional Exam Guide
    Rahul Deshmukh
    2025
  43. Behavioral Insights in Cybersecurity
    Dustin S. Sachs
    2025
  44. Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare
    2025
  45. Ultimate Microsoft XDR for Full Spectrum Cyber Defence
    Ian David Hanley
    2025
  46. Guardians of the Digital Age
    Elçin Biren
    2025
  47. Building Decentralized Applications with Ethereum and Solidity
    Shri Raghu Raaman Thiyagharajan
    2025
  48. Kickstart Quantum Computing and Communication Fundamentals
    Paras Nath Barwal, Dr. Kamta Nath Mishra's
    2025
  49. Ultimate Hyperledger Fabric for DeFi with Blockchain
    Shubham Jain
    2025
  50. Analysis of Threat Perceptions
    Mehmet Emin Erendor
    2025
  51. Cybersecurity in Knowledge Management
    2025
  52. Securing Talent
    Kevin Lynn McLaughlin
    2025
  53. Next Generation Data Science and Blockchain Technology for Industry 5.0
    2025
  54. Systematic Security
    Timur Qader
    2025
  55. Multimedia Security
    2025
  56. Security Technologies for Law Enforcement Agencies
    Kazım Duraklar
    2025
  57. Dynamical Systems
    2025
  58. Hacking Cryptography
    Kamran Khan, Bill Cox
    2025
  59. CISO: Evolution of a Vocation
    Ron Baklarz
    2026
  60. The Future of Business and Society
    2026
View all

Recently added

1 of 20
  1. The NIST 2.0 Cybersecurity Framework
    The NIST 2.0 Cybersecurity Framework
    Cynthia Brumfield
    2026
  2. Wallets Demystified
    Wallets Demystified
    T.S Avini
    2026
  3. Cumulative Effect
    Cumulative Effect
    Vladas Leonas
    2026
  4. Handbook of Security, Quantum Computing and Internet of Things
    2026
  5. CyberSentinel+
    Akshay Mudgal
    2026
  6. Beyond The Invisible Nexus
    Akashdeep Bhardwaj, Saksham Garg
    2026
  7. Blueprint for Applied Subatomic Computing in 2026
    Azhar ul Haque Sario
    2026
  8. Cybersecurity Hyperglossary
    Gary Hinson, Dr. Gary Hinson, MBA
    2026
  9. Cybersecurity and Ethics
    Murthy V. Rallapalli
    2026
  10. Cybersecurity Risk Management
    Jayet Moon, Jeet Shah
    2026
  11. Red Team Evaluation Framework
    Matthias Muhlert
    2026
  12. Forensic Investigation of Smart Digital Devices
    Farkhund Iqbal
    2026
  13. Security Engineering
    Harvinder Singh Gill
    2025
  14. Cybercrime and Digital Security
    Mayank Bhushan, Dr. Aatif Jamshed
    2025
  15. Identity Security for Software Development
    Aiyan Ma
    2025
  16. Adversarial Machine Learning
    Jason Edwards
    2026
  17. Mathematics for the Digital Systems Engineer
    Chris J. Mitchell
    2025
  18. Security Tokens and Stablecoins Quick Start Guide
    Weimin Sun, Xun (Brian) Wu, Angela Kwok
    2019
  19. Mastering Ethereum
    Merunas Grincalaitis
    2019
  20. Foundations of Blockchain
    Koshik Raj
    2019
  21. Hands-On Cryptography with Python
    Samuel Bowne
    2018
  22. Practical Cyber Intelligence
    Wilson Bautista
    2018
  23. Mastering Cybersecurity
    Akashdeep Bhardwaj
    2025
  24. Spies, Lies, and Cybercrime
    Eric O'Neill
    2025
  25. Cybersecurity for 2025
    Azhar ul Haque Sario
    2025
  26. Cryptography Algorithms
    Massimo Bertaccini
    2024
  27. Threat Modeling Gameplay with EoP
    Brett Crawley
    2024
  28. Hack the Cybersecurity Interview
    Christophe Foulon, Ken Underhill, Tia Hopkins
    2024
  29. Digital Forensics in Next-Generation Internet of Medical Things
    2025
  30. Privilege Escalation Techniques
    Alexis Ahmed
    2021
  31. Securing Blockchain Networks like Ethereum and Hyperledger Fabric
    Alessandro Parisi
    2020
  32. Mastering Blockchain
    Imran Bashir
    2023
  33. The Vulnerability Researcher's Handbook
    Benjamin Strout
    2023
  34. Microsoft Azure Security Technologies Certification and Beyond
    David Okeyode
    2021
  35. Quantum Computing and Blockchain in Business
    Arunkumar Krishnakumar
    2020
  36. Mastering Blockchain
    Imran Bashir
    2020
  37. A CISO Guide to Cyber Resilience
    Debra Baker
    2024
  38. Practical Artificial Intelligence and Blockchain
    Ganesh Prasad Kumble
    2020
  39. Practical Cybersecurity Architecture
    Ed Moyle, Diana Kelley
    2020
  40. Incident Response with Threat Intelligence
    Roberto Martinez
    2022
  41. Cybersecurity Attacks – Red Team Strategies
    Johann Rehberger
    2020
  42. Cybersecurity Blue Team Strategies
    Kunal Sehgal, Nikolaos Thymianis
    2023
  43. Hands-On Blockchain for Python Developers
    Arjuna Sky Kok
    2024
  44. Cryptography Algorithms
    Massimo Bertaccini
    2022
  45. Cyber Warfare – Truth, Tactics, and Strategies
    Dr. Chase Cunningham
    2020
  46. Turkish Counterterrorism Strategy against the PKK
    2025
  47. Ultimate Event-Driven Architecture with Python and Apache Kafka
    Gopal Sharma
    2025
  48. Algorithms and Theory of Computation Handbook, Volume 2
    2009
  49. Edge Intelligence and Analytics for Internet of Things
    2025
  50. Cloud Computing Security
    Neha Agrawal, Rohit Kumar, Shashikala Tapaswi
    2025
  51. Traditional vs Generative AI Pentesting
    Yassine Maleh
    2025
  52. Becoming Quantum Safe
    Jai Singh Arun, Ray Harishankar, Walid Rjaibi
    2025
  53. Elliptic Curve Cryptography for Developers
    Michael Rosing
    2025
  54. The CISO 3.0
    Walt Powell
    2025
  55. Digital Twin Technology for Better Health
    2025
  56. Quantum Unmanned Aerial Vehicle
    2025
  57. Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures
    2025
  58. Cyber Risk Management in Practice
    Carlos Morales
    2025
  59. Hands-on Penetration Testing for Web Applications - 2nd Edition
    Richa Gupta
    2025
  60. Biometric Technology and Authentication
    Ravi Das
    2025
View all

PERLEGO

PricingFAQsContact UsPerlego for InstructorsPerlego for InstitutionsPerlego for PublishersCareersPress

BROWSE

TopicsPublishersIndexKnowledge BaseStudy GuidesHarvard Referencing GuidesAPA Referencing GuidesEssay Writing GuidesResearch Assistant
ArchitectureArtBiological SciencesBusinessComputer ScienceDesignEconomicsEducationHistoryLanguages & LinguisticsLawLiteratureMathematicsMedia & Performing ArtsMedicinePersonal DevelopmentPhilosophyPhysical SciencesPolitics & International RelationsPsychologySocial SciencesStudy AidsTechnology & EngineeringTheology & Religion

Made with ☂︎ in London - © 2026 Perlego Ltd - Perlego HQ, 1 Waterhouse Sq, 138 Holborn, London, EC1N 2ST, United Kingdom - VAT 246681777

PrivacyTermsContent Policy
, (opens in new tab)
BooksSubtopicsPublishersIndexMissionCookiesSmart SearchAccessibility
, (opens in new tab)
Help Centre
, (opens in new tab)
Knowledge Base
, (opens in new tab)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Instagram
Facebook
LinkedIn
Tiktok
X
DeutschEnglishEspañolFrançaisItaliano