Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cryptography
Computer Science
Cryptography
Explore
Books
Related topics
English
close
Most popular
close
Showing 361 - 414 out of 414 books
Blockchain Technology Revolution in Business Explained
Bob Mather
2018
Sign up to read
Blockchain Technology Revolution in Business Explained
Bob Mather
2018
Blockchain By Example
Bellaj Badr, Richard Horrocks, Xun (Brian) Wu
2018
Sign up to read
Blockchain By Example
Bellaj Badr, Richard Horrocks, Xun (Brian) Wu
2018
The Mathematics of Secrets
Joshua Holden
2018
Sign up to read
The Mathematics of Secrets
Joshua Holden
2018
Blockchain for Enterprise
Narayan Prusty
2018
Sign up to read
Blockchain for Enterprise
Narayan Prusty
2018
Hacking im Web 2.0
Tim Philipp Schäfers
2018
Sign up to read
Hacking im Web 2.0
Tim Philipp Schäfers
2018
Optical Coding Theory with Prime
Wing C. Kwong, Guu-Chang Yang
2018
Sign up to read
Optical Coding Theory with Prime
Wing C. Kwong, Guu-Chang Yang
2018
Advances of DNA Computing in Cryptography
Suyel Namasudra, Ganesh Chandra Deka
2018
Sign up to read
Advances of DNA Computing in Cryptography
Suyel Namasudra, Ganesh Chandra Deka
2018
Ethereum Cookbook
Manoj P R
2018
Sign up to read
Ethereum Cookbook
Manoj P R
2018
Learn Bitcoin and Blockchain
Kirankalyan Kulkarni
2018
Sign up to read
Learn Bitcoin and Blockchain
Kirankalyan Kulkarni
2018
Hands-On Bitcoin Programming with Python
Harish Kumar Garg
2018
Sign up to read
Hands-On Bitcoin Programming with Python
Harish Kumar Garg
2018
Learn Ethereum: The Collection
Bruno Skvorc, Mislav Javor, Tonino Jankov, Mateja Kendel, Chris Ward, Ahmed Bouchefra, David Attard
2018
Sign up to read
Learn Ethereum: The Collection
Bruno Skvorc, Mislav Javor, Tonino Jankov, Mateja Kendel, Chris Ward, Ahmed Bouchefra, David Attard
2018
Build Your First Ethereum DApp
Bruno Skvorc
2018
Sign up to read
Build Your First Ethereum DApp
Bruno Skvorc
2018
Ethereum: Tools & Skills
Bruno Skvorc, Ahmed Bouchefra, Mislav Javor, Tonino Jankov
2018
Sign up to read
Ethereum: Tools & Skills
Bruno Skvorc, Ahmed Bouchefra, Mislav Javor, Tonino Jankov
2018
Passwords
Brian Lennon
2018
Sign up to read
Passwords
Brian Lennon
2018
Multiple-Base Number System
Vassil Dimitrov, Graham Jullien, Roberto Muscedere
2017
Sign up to read
Multiple-Base Number System
Vassil Dimitrov, Graham Jullien, Roberto Muscedere
2017
Security and Privacy in Cyber-Physical Systems
Houbing Song, Glenn A. Fink, Sabina Jeschke
2017
Sign up to read
Security and Privacy in Cyber-Physical Systems
Houbing Song, Glenn A. Fink, Sabina Jeschke
2017
Windows Forensics Cookbook
Oleg Skulkin, Scar de Courcier
2017
Sign up to read
Windows Forensics Cookbook
Oleg Skulkin, Scar de Courcier
2017
Unsolved!
Craig P. Bauer
2017
Sign up to read
Unsolved!
Craig P. Bauer
2017
Elements of Quasigroup Theory and Applications
Victor Shcherbacov
2017
Sign up to read
Elements of Quasigroup Theory and Applications
Victor Shcherbacov
2017
Guide to Pairing-Based Cryptography
Nadia El Mrabet, Marc Joye
2017
Sign up to read
Guide to Pairing-Based Cryptography
Nadia El Mrabet, Marc Joye
2017
Cyber-Assurance for the Internet of Things
Tyson T. Brooks
2016
Sign up to read
Cyber-Assurance for the Internet of Things
Tyson T. Brooks
2016
Color Image Watermarking
Qingtang Su
2016
Sign up to read
Color Image Watermarking
Qingtang Su
2016
Electromagnetic Compatibility
David A. Weston
2016
Sign up to read
Electromagnetic Compatibility
David A. Weston
2016
Data Hiding Techniques in Windows OS
Nihad Ahmad Hassan, Rami Hijazi
2016
Sign up to read
Data Hiding Techniques in Windows OS
Nihad Ahmad Hassan, Rami Hijazi
2016
DDoS Attacks
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2016
Sign up to read
DDoS Attacks
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2016
Security and Policy Driven Computing
Lei Liu
2016
Sign up to read
Security and Policy Driven Computing
Lei Liu
2016
Computational Number Theory
Abhijit Das
2016
Sign up to read
Computational Number Theory
Abhijit Das
2016
Noiseless Steganography
Abdelrahman Desoky
2016
Sign up to read
Noiseless Steganography
Abdelrahman Desoky
2016
Bitcoin Essentials
Albert Szmigielski
2016
Sign up to read
Bitcoin Essentials
Albert Szmigielski
2016
Kryptografie mit .NET.
Tam Hanna
2016
Sign up to read
Kryptografie mit .NET.
Tam Hanna
2016
Candidate Multilinear Maps
Sanjam Garg
2015
Sign up to read
Candidate Multilinear Maps
Sanjam Garg
2015
Practical Cryptography
2014
Sign up to read
Practical Cryptography
2014
Practical Cryptography
Saiful Azad, Al-Sakib Khan Pathan
2014
Sign up to read
Practical Cryptography
Saiful Azad, Al-Sakib Khan Pathan
2014
Hardware Security
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2014
Sign up to read
Hardware Security
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2014
Data Protection and Security for Personal Computers
R. Schifreen
2014
Sign up to read
Data Protection and Security for Personal Computers
R. Schifreen
2014
Android Security Cookbook
Keith Makan, Scott Alexander-Bown
2013
Sign up to read
Android Security Cookbook
Keith Makan, Scott Alexander-Bown
2013
Managing Trust in Cyberspace
2013
Sign up to read
Managing Trust in Cyberspace
2013
Android Application Security Essentials
Pragati Ogal Rai
2013
Sign up to read
Android Application Security Essentials
Pragati Ogal Rai
2013
Introduction to Computer and Network Security
Richard R. Brooks
2013
Sign up to read
Introduction to Computer and Network Security
Richard R. Brooks
2013
Network Anomaly Detection
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2013
Sign up to read
Network Anomaly Detection
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2013
Network Anomaly Detection
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2013
Sign up to read
Network Anomaly Detection
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2013
Handbook of Finite Fields
Gary L. Mullen, Daniel Panario
2013
Sign up to read
Handbook of Finite Fields
Gary L. Mullen, Daniel Panario
2013
Simple Steps to Data Encryption
Peter Loshin
2013
Sign up to read
Simple Steps to Data Encryption
Peter Loshin
2013
New Directions of Modern Cryptography
Zhenfu Cao
2012
Sign up to read
New Directions of Modern Cryptography
Zhenfu Cao
2012
Computational Number Theory and Modern Cryptography
Song Y. Yan
2012
Sign up to read
Computational Number Theory and Modern Cryptography
Song Y. Yan
2012
Communication System Security
Lidong Chen, Guang Gong
2012
Sign up to read
Communication System Security
Lidong Chen, Guang Gong
2012
Communication System Security
Lidong Chen, Guang Gong
2012
Sign up to read
Communication System Security
Lidong Chen, Guang Gong
2012
RC4 Stream Cipher and Its Variants
Goutam Paul, Subhamoy Maitra
2011
Sign up to read
RC4 Stream Cipher and Its Variants
Goutam Paul, Subhamoy Maitra
2011
Algebraic Geometry in Coding Theory and Cryptography
Harald Niederreiter, Chaoping Xing
2009
Sign up to read
Algebraic Geometry in Coding Theory and Cryptography
Harald Niederreiter, Chaoping Xing
2009
Blockchain Applications in Cybersecurity Solutions
2009
Sign up to read
Blockchain Applications in Cybersecurity Solutions
2009
Disappearing Cryptography
Peter Wayner
2009
Sign up to read
Disappearing Cryptography
Peter Wayner
2009
Cryptography for Developers
Tom St Denis
2006
Sign up to read
Cryptography for Developers
Tom St Denis
2006
Data Acquisition Techniques Using PCs
Howard Austerlitz
2002
Sign up to read
Data Acquisition Techniques Using PCs
Howard Austerlitz
2002
Adversarial Machine Learning
Jason Edwards
2026
Sign up to read
Adversarial Machine Learning
Jason Edwards
2026
1
...
2
3
4
5
6
7