The mathematics of secrets : cryptography from Caesar ciphers to digital encryption /
Unsolved! : the history and mystery of the world's greatest ciphers from ancient Egypt to online secret societies /
Cryptography Algorithms : A Guide to Algorithms in Blockchain, Quantum Cryptography, Zero-Knowledge Protocols, and Homomorphic Encryption /
The Rohonc Code : Tracing a Historical Riddle /
Secret language /
Gendai angō no tanjō to hatten : posuto ryōshi angō, kasō tsūka, atarashii angō /
Mathematical recreations & essays /
Pseudorandomness and cryptographic applications /
Cryptography and network security.
The Cipher of Roger Bacon /
Improving Your C# Skills : Solve Modern Challenges with Functional Programming and Test-Driven Techniques of C#.
Blockchain Developer's Guide : Develop Smart Applications with Blockchain Technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda.
Partition-Based Trapdoor Ciphers
Python 3 and data analytics : pocket primer /
Hands-on web scraping with Python : perform advanced scraping operations using various Python libraries and tools such as Selenium, Regex, and others /
Python Tools for Data Scientists Pocket Primer
Learning Python for forensics : learning the art of designing, developing, and deploying innovative forensic solutions through Python /
Hands-on data analysis with Pandas : efficiently perform data collection, wrangling, analysis, and visualization using Python /
Basics of contemporary cryptography for IT practitioners /
Python Data Mining Quick Start Guide : a Beginner's Guide to Extracting Valuable Insights from Your Data.
Natural language processing and computational linguistics : a practical guide to text analysis with Python, Gensim, spaCy, and Keras /
Python deep learning : exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow /
IPython Interactive Computing and Visualization Cookbook.
Artificial intelligence by example : develop machine intelligence from scratch using real artificial intelligence use cases /
Hands-on data science and Python machine learning : perform data mining and machine learning efficiently using Python and Spark /
Mastering Python for finance /
OpenCV with Python by example : build real-world computer vision applications and develop cool demos using OpenCV for Python /
Python 2.6 graphics cookbook : over 100 great recipes for creating and animating graphics using Python /
Learn Robotics Programming : Build and Control Autonomous Robots Using Raspberry Pi 3 and Python.
Python deep learning cookbook : over 75 practical recipes on neural network modeling, reinforcement learning, and transfer learning using Python /
Mastering pandas : a complete guide to pandas, from installation to advanced data analysis techniques, 2nd Edition. /
FreeCAD [how-to] : solid modeling with the power of Python /
Data Science with Python : Combine Python with Machine Learning Principles to Discover Hidden Patterns in Raw Data.
OpenCV 4 with Python blueprints become proficient in computer vision by designing advanced projects using OpenCV 4 with Python 3.8 /
Programming ArcGIS 10.1 with Python Cookbook.
Learning NumPy Array /
Mastering Python for finance : implement advanced state-of-the-art financial statistical applications using Python /
Python : deeper insights into machine learning : leverage benefits of machine learning techniques using Python : a course in three modules.
Artificial intelligence with Python : build real-world artificial intelligence applications with Python to intelligently interact with the world around you /
Data analysis with Python : a modern approach /
Coding theory and cryptology /
Advances on superelliptic curves and their applications /
Hands-on cryptography with Python : leverage the power of Python to encrypt and decrypt data /
Rise of the Mavericks : the U.S. Air Force security service and the Cold War, 1948-1979 /
The reader of gentlemen's mail : Herbert O. Yardley and the birth of American codebreaking /
Venona : decoding Soviet espionage in America /
Democratizing Cryptography The Work of Whitfield Diffie and Martin Hellman.
Secret cables of the Comintern, 1933-1943 /
Defending whose country? : Indigenous soldiers in the Pacific war /
Algebraic geometry in coding theory and cryptography /
Conversations about Physics.
Cryptoreality : A Conversation with Artur Ekert.
Security Tokens and Stablecoins Quick Start Guide : Learn How to Build STO and Stablecoin Decentralized Applications.
Unsung Heroes of World War II : The Story of the Navajo Code Talkers.