Skip to main content
Discover
Pricing
WEBSITE LANGUAGE
Deutsch - DE
English - EN
selected language
Español - ES
Français - FR
Italiano - IT
Your selection
will not affect books.
Website language selection impacts menus and navigation.
globe icon
English
close
Login
Sign up to read
WEBSITE LANGUAGE
Deutsch - DE
English - EN
selected language
Español - ES
Français - FR
Italiano - IT
Your selection
will not affect books.
Website language selection impacts menus and navigation.
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Discover
Computer Science
Cryptography
Computer Science
Cryptography
Explore
Books
Related topics
All languages
close
Most popular
close
Showing 181 - 240 out of 331 books
Blockchain for Real World Applications
Rishabh Garg
2022
Cloudmoney
Brett Scott
2022
Securing Mobile Devices and Technology
Kutub Thakur, Al-Sakib Khan Pathan
2021
Trust in Computer Systems and the Cloud
Mike Bursell
2021
Threat Hunting in the Cloud
Chris Peiris, Binil Pillai, Abbas Kudrati
2021
A Practical Introduction to Enterprise Network and Security Management
Bongsik Shin
2021
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Cybersecurity For Dummies
Joseph Steinberg
2019
Tribe of Hackers Red Team
Marcus J. Carey, Jennifer Jin
2019
CCNA Cyber Ops SECOPS – Certification Guide 210-255
Andrew Chu
2019
Mastering Ethereum
Merunas Grincalaitis
2019
Data Security in Cloud Computing, Volume I
Giulio D'Agostino
2019
Wireshark for Security Professionals
Jessey Bullock, Jeff T. Parker
2017
Electromagnetic Compatibility
David A. Weston
2016
Secure Multiparty Computation and Secret Sharing
Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen
2015
Hardware Security
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2014
Android Security Cookbook
Keith Makan, Scott Alexander-Bown
2013
Introduction to Computer and Network Security
Richard R. Brooks
2013
Network Anomaly Detection
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2013
Quantum Information Theory
Mark M. Wilde
2013
Windows Registry Forensics
Harlan Carvey
2011
Algebraic Geometry in Coding Theory and Cryptography
Harald Niederreiter, Chaoping Xing
2009
Cryptography for Developers
Tom St Denis
2006
Information Technology Security and Risk Management
2024
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
The Zero Trust Framework and Privileged Access Management
Ravindra Das
2024
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Symmetric Cryptography, Volume 1
2023
CCSP For Dummies
Arthur J. Deane
2023
Dark World
Atif Ali, Muhammad Qasim
2023
Symmetric Cryptography, Volume 2
2023
Symmetric Cryptography, Volume 2
2023
Automated Secure Computing for Next-Generation Systems
2023
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Convergence of Blockchain, AI and IoT
B Balamurugan, T Poongodi, M R Manu, S Karthikeyan, Yogesh Sharma
2023
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
The Zero Trust Framework
Ravindra Das
2023
Ciberseguridad para niños con minecraft
30600
2023
Ingeniería inversa. Curso práctico
Cayetano de Juan
2023
PKI Implementation and Infrastructures
Julian Ashbourn
2023
Teaching Cybersecurity
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
2023
Intelligent Mobile Malware Detection
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
2022
Cyber Security and Operations Management for Industry 4.0
Ahmed A Elngar, N. Thillaiarasu, Mohamed Elhoseny, K. Martin Sagayam
2022
Losing the Cybersecurity War
Steve King
2022
Securing the Nation's Critical Infrastructures
Drew Spaniel
2022
What To Do When You Get Hacked
Shimon Brathwaite
2022
Zero Trust Journey Across the Digital Estate
Abbas Kudrati, Binil A. Pillai
2022
Secret Key Cryptography
Frank Rubin
2022
Democratizing Cryptography
Rebecca Slayton
2022
Kryptowährungen für Dummies
Krijn Soeteman
2022
Evidence-Based Cybersecurity
Pierre-Luc Pomerleau, David Maimon
2022
Cyber Crime Investigator's Field Guide
Bruce Middleton
2022
1
2
3
4
5
6