Title: Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program, Author: John Jackson
Title: Risk Control Theory Of Online Transactions, Author: Changjun Jiang
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Advanced Security Solutions for Multimedia, Author: Irshad Ansari
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: The Security Hippie, Author: Barak Engel
Title: Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency, Author: Paul Paxton
Title: Multimedia Security 1: Authentication and Data Hiding, Author: William Puech
Title: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Author: Rebecca Slayton
Title: Practical Mathematical Cryptography, Author: Kristian Gjøsteen
Title: Asymmetric Cryptography: Primitives and Protocols, Author: David Pointcheval
Title: Blockchain for Real World Applications, Author: Rishabh Garg
Title: Cryptography for Payment Professionals, Author: Ilya Dubinsky
Title: Mastering Kali Purple: For Vulnerability Assessment and Penetration Testing, Author: EL MOSTAFA OUCHEN
Title: Microcontroller Exploits, Author: Travis Goodspeed Pre-Order Now

Pagination Links