Title: Cryptography for Payment Professionals, Author: Ilya Dubinsky
Title: Blockchain for Real World Applications, Author: Rishabh Garg
Title: Asymmetric Cryptography: Primitives and Protocols, Author: David Pointcheval
Title: Practical Mathematical Cryptography, Author: Kristian Gjøsteen
Title: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Author: Rebecca Slayton
Title: Multimedia Security 1: Authentication and Data Hiding, Author: William Puech
Title: The Security Hippie, Author: Barak Engel
Title: Advanced Security Solutions for Multimedia, Author: Irshad Ansari
Title: Risk Control Theory Of Online Transactions, Author: Changjun Jiang
Title: Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program, Author: John Jackson
Title: An In-Depth Guide to Mobile Device Forensics, Author: Chuck Easttom
Title: Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, Author: Aiden A. Bruen
Title: Dynamically Enabled Cyber Defense, Author: Lin Yang
Title: Essential Enterprise Blockchain Concepts and Applications, Author: Kavita Saini
Title: Codebreaking and Signals Intelligence, Author: Christopher Andrew
Title: Archives in the Digital Age: Preservation and the Right to be Forgotten, Author: Abderrazak Mkadmi
Title: Concise Encyclopedia of Coding Theory, Author: W. Cary Huffman
Title: Building Secure Cars: Assuring the Automotive Software Development Lifecycle, Author: Dennis Kengo Oka
Title: Cybersecurity in Humanities and Social Sciences: A Research Methods Approach, Author: Hugo Loiseau
Title: The Battle of the Atlantic and Signals Intelligence: U-Boat Situations and Trends, 1941-1945 / Edition 1, Author: David Syrett

Pagination Links