Cryptography and network security.
Quantum Computing for the Quantum Curious
International Symposium on Mathematics, Quantum Theory, and Cryptography
Basics of contemporary cryptography for IT practitioners /
Cryptoreality : A Conversation with Artur Ekert.
Gendai angō no tanjō to hatten : posuto ryōshi angō, kasō tsūka, atarashii angō /
Algebraic geometry in coding theory and cryptography /
Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Network security evaluation : using the NSA IEM /
Managing Cisco network security /
Network and system security /
Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis /
Decoding reality : the universe as quantum information /
Coding theory and cryptology /
Web application security is a stack : how to CYA (Cover Your Apps) completely /
Managing information security /
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption /
Quantum, nano, micro technologies and applied researches : selected, peer reviewed papers from the 2013 2nd International Symposium on Quantum, Nano and Micro Technologies (ISQNM 2013), December 1-2, 2013, Singapore /
Quantum information III : proceedings of the third international conference, Meijo University, Japan, 7-10 March 2000 /
Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /
Quantum information /
Classical and Quantum Information Theory : an Introduction for the Telecom Scientist.
Microwave techniques in superconducting quantum computers /