Skip to main content
Esplora
Scopri i piani
LINGUA DEL SITO
Deutsch - DE
English - EN
Español - ES
Français - FR
Italiano - IT
selected language
La selezione
non influirà sui libri.
La selezione della lingua del sito web si applica ai menu e all'interfaccia di navigazione.
globe icon
Italiano
close
Accedi
Iscriviti per iniziare a leggere
LINGUA DEL SITO
Deutsch - DE
English - EN
Español - ES
Français - FR
Italiano - IT
selected language
La selezione
non influirà sui libri.
La selezione della lingua del sito web si applica ai menu e all'interfaccia di navigazione.
globe icon
Italiano
close
Sfoglia per categoria
Architettura
Arte
Scienze biologiche
Gestione aziendale
Informatica
Design
Economia
Didattica
Storia
Lingue e linguistica
Giurisprudenza
Letteratura
Matematica
Mezzi di comunicazione e arti performative
Medicina
Crescita personale
Filosofia
Fisica
Politica e relazioni internazionali
Psychology
Scienze sociali
Manuali di studio
Tecnologia e ingegneria
Teologia e religione
Oppure cerca per
Sottocategorie
Editori
Index
Esplora le risorse didattiche
Knowledge Base
Guide allo studio
Guide per la scrittura di saggi
Home
Esplora
Informatica
Crittografia
Informatica
Crittografia
Scopri
Libri
Categorie correlate
Tutte le lingue
close
I più letti
close
Visualizzazione di 181 - 240 libri su 332
The Vulnerability Researcher's Handbook
Benjamin Strout
2023
Blockchain for Real World Applications
Rishabh Garg
2022
Cloudmoney
Brett Scott
2022
Securing Mobile Devices and Technology
Kutub Thakur, Al-Sakib Khan Pathan
2021
Trust in Computer Systems and the Cloud
Mike Bursell
2021
Discrete Mathematics With Cryptographic Applications
Alexander I. Kheyfits
2021
Threat Hunting in the Cloud
Chris Peiris, Binil Pillai, Abbas Kudrati
2021
A Practical Introduction to Enterprise Network and Security Management
Bongsik Shin
2021
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Cybersecurity For Dummies
Joseph Steinberg
2019
Tribe of Hackers Red Team
Marcus J. Carey, Jennifer Jin
2019
CCNA Cyber Ops SECOPS – Certification Guide 210-255
Andrew Chu
2019
Mastering Ethereum
Merunas Grincalaitis
2019
Data Security in Cloud Computing, Volume I
Giulio D'Agostino
2019
Wireshark for Security Professionals
Jessey Bullock, Jeff T. Parker
2017
Electromagnetic Compatibility
David A. Weston
2016
Secure Multiparty Computation and Secret Sharing
Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen
2015
Hardware Security
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2014
Android Security Cookbook
Keith Makan, Scott Alexander-Bown
2013
Introduction to Computer and Network Security
Richard R. Brooks
2013
Network Anomaly Detection
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2013
Quantum Information Theory
Mark M. Wilde
2013
Windows Registry Forensics
Harlan Carvey
2011
Algebraic Geometry in Coding Theory and Cryptography
Harald Niederreiter, Chaoping Xing
2009
Cryptography for Developers
Tom St Denis
2006
L'arte dell'invisibilità
Kevin D. Mitnick, Robert Vamosi
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
The Zero Trust Framework and Privileged Access Management
Ravindra Das
2024
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Symmetric Cryptography, Volume 1
2023
CCSP For Dummies
Arthur J. Deane
2023
Dark World
Atif Ali, Muhammad Qasim
2023
Symmetric Cryptography, Volume 2
2023
Symmetric Cryptography, Volume 2
2023
Automated Secure Computing for Next-Generation Systems
2023
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Convergence of Blockchain, AI and IoT
B Balamurugan, T Poongodi, M R Manu, S Karthikeyan, Yogesh Sharma
2023
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
The Zero Trust Framework
Ravindra Das
2023
Ciberseguridad para niños con minecraft
30600
2023
Ingeniería inversa. Curso práctico
Cayetano de Juan
2023
PKI Implementation and Infrastructures
Julian Ashbourn
2023
Teaching Cybersecurity
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
2023
Intelligent Mobile Malware Detection
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
2022
Cyber Security and Operations Management for Industry 4.0
Ahmed A Elngar, N. Thillaiarasu, Mohamed Elhoseny, K. Martin Sagayam
2022
Losing the Cybersecurity War
Steve King
2022
Securing the Nation's Critical Infrastructures
Drew Spaniel
2022
What To Do When You Get Hacked
Shimon Brathwaite
2022
Zero Trust Journey Across the Digital Estate
Abbas Kudrati, Binil A. Pillai
2022
Secret Key Cryptography
Frank Rubin
2022
Democratizing Cryptography
Rebecca Slayton
2022
Kryptowährungen für Dummies
Krijn Soeteman
2022
1
2
3
4
5
6