Title: Microcontroller Exploits, Author: Travis Goodspeed Pre-Order Now
Title: Mastering Kali Purple: For Vulnerability Assessment and Penetration Testing, Author: EL MOSTAFA OUCHEN
Title: Cryptography for Payment Professionals, Author: Ilya Dubinsky
Title: Blockchain for Real World Applications, Author: Rishabh Garg
Title: Asymmetric Cryptography: Primitives and Protocols, Author: David Pointcheval
Title: Practical Mathematical Cryptography, Author: Kristian Gjøsteen
Title: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Author: Rebecca Slayton
Title: Multimedia Security 1: Authentication and Data Hiding, Author: William Puech
Title: Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency, Author: Paul Paxton
Title: The Security Hippie, Author: Barak Engel
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Advanced Security Solutions for Multimedia, Author: Irshad Ansari
Title: Risk Control Theory Of Online Transactions, Author: Changjun Jiang
Title: Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program, Author: John Jackson
Title: An In-Depth Guide to Mobile Device Forensics, Author: Chuck Easttom
Title: Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, Author: Aiden A. Bruen
Title: Dynamically Enabled Cyber Defense, Author: Lin Yang
Title: Essential Enterprise Blockchain Concepts and Applications, Author: Kavita Saini
Title: Codebreaking and Signals Intelligence, Author: Christopher Andrew

Pagination Links