The mathematics of secrets : cryptography from Caesar ciphers to digital encryption /
Gendai angō no tanjō to hatten : posuto ryōshi angō, kasō tsūka, atarashii angō /
Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /
Cryptoreality : A Conversation with Artur Ekert.
Algebraic geometry in coding theory and cryptography /
Hands-on cryptography with Python : leverage the power of Python to encrypt and decrypt data /
Cryptography and network security.
Cryptography Algorithms : A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption /
Unsolved! : the history and mystery of the world's greatest ciphers from ancient Egypt to online secret societies /
Applied Cryptography for Researchers and Practitioners.
Conversations about Physics.
Mathematics and computation : a theory revolutionizing technology and science /
Security Tokens and Stablecoins Quick Start Guide : Learn How to Build STO and Stablecoin Decentralized Applications.
Coding theory and cryptology /
Blockchain Developer's Guide : Develop Smart Applications with Blockchain Technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda.
Pseudorandomness and cryptographic applications /
Advanced Blockchain Development : Build Highly Secure, Decentralized Applications and Conduct Secure Transactions.
Democratizing Cryptography The Work of Whitfield Diffie and Martin Hellman.
Improving Your C# Skills : Solve Modern Challenges with Functional Programming and Test-Driven Techniques of C#.
International Symposium on Mathematics, Quantum Theory, and Cryptography
Cybersecurity governance in Latin America states, threats, and alliances /
Internet privacy rights : rights to protect autonomy /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Securing the cloud : cloud computer security techniques and tactics /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Hack proofing XML /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Techniques and applications of digital watermarking and content protection /
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Nokia network security : solutions handbook /
Cyber crime, security and digital intelligence /
Technology and privacy : the new landscape /
Who goes there? : authentication through the lens of privacy /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /
Advances on superelliptic curves and their applications /
Rise of the Mavericks : the U.S. Air Force security service and the Cold War, 1948-1979 /
The reader of gentlemen's mail : Herbert O. Yardley and the birth of American codebreaking /
Mathematical recreations & essays /
Venona : decoding Soviet espionage in America /
Secret cables of the Comintern, 1933-1943 /
Defending whose country? : Indigenous soldiers in the Pacific war /
The Rohonc Code : Tracing a Historical Riddle /
Unsung Heroes of World War II : The Story of the Navajo Code Talkers.
Basics of contemporary cryptography for IT practitioners /