for Cybersecurity and Cryptography Lerner Students and Professionals. we Collect the Best Menu of Books , for the Best Publishers and Professional Authors in the Field.
A Practical Introduction to Modern Encryption
Author : Jean-Philippe Aumasson
Publisher : No Starch Press
Issue Date : 2018
PRINCIPLES AND PRACTICE
Author : William Stallings
Publisher : Pearson Education Limited
Issue Date : 2017
Author : Christof Paar - Jan Pelzl
Publisher : Springer
Issue Date : 2010
14th International Conference, CANS 2015 Marrakesh, Morocco, December 10–12, 2015 Proceedings
Author : Michael Reiter - David Naccache (Eds.)
Publisher : Springer
Issue Date : 2015
A Classical Introduction to Informational and Mathematical Principle
Author : Zhiyong Zheng
Publisher : Springer
Issue Date : 2021
A Classical Introduction to Informational and Mathematical Principle
Author : Zhiyong Zheng
Publisher : Springer
Issue Date : 2022
8th Theory of Cryptography Conference, TCC 2011 Providence, RI, USA, March 28-30, 2011 Proceedings
Author : Yuval Ishai (Ed.)
Publisher : Springer
Issue Date : 2011
see What it Takes to Build an industrial-Strength Crypto API
Author : MICHAEL WELSCHENBACH
Publisher : apress
Issue Date : 2005
Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Author : Stefania Loredana Nita - Marius Iulian Mihailescu
Publisher : apress
Issue Date : 2022
A N I N T R O D U C T I O N T O B U I L D I N G A N D B R E A K I N G C I P H E R S
Author : Al Sweigart
Publisher : No Starch Press
Issue Date : 2018
Author : Sihan Qing - Chris Mitchell Liqun Chen - Dongmei Liu (Eds.)
Publisher : Springer
Issue Date : 2018
Leverage the power of Python to encrypt and decrypt data
Author : Samuel Bowne
Publisher : Packt Publishing
Issue Date : 2018
The Ethical Hackers Handbook, Sixth Edition
Author : Dr. Allen Harper - Ryan Linn - Stephen Sims - Michael Baucom - Huáscar Tejeda - Daniel Fernandez - Moses Frost
Publisher : McGraw Hill
Issue Date : 2022
Author : Dr. Allen Harper - Ryan Linn - Stephen Sims - Michael Baucom - Huáscar Tejeda - Daniel Fernandez - Moses Frost
Publisher : McGraw Hill
Issue Date : 2018
Computational Techniques for Resolving Security Issues
Author : Sanjib Sinha
Publisher : apress
Issue Date : 2018
HOW TO TAKE OVER ANY COMPANY IN THE WORLD
Author : ROYCE DAVIS
Publisher : Manning Publications
Issue Date : 2020
Author : David Hook
Publisher : Wiley Publishing, Inc.
Issue Date : 2005
Author : Jonathan B. Knudsen
Publisher : O'Reilly & Associates, Inc.
Issue Date : 1998
Best Practices for Designing, Implementing, and Maintaining Systems
Author : Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea, and Adam Stubblefield
Publisher : O'Reilly & Associates, Inc.
Issue Date : 2020
Author : Song Y. Yan
Publisher : Springer
Issue Date : 2018
Author : Tsuyoshi Takagi • Masato Wakayama Keisuke Tanaka • Noboru Kunihiro Kazufumi Kimoto • Dung Hoang Duong
Publisher : Springer
Issue Date : 2018
9th International Conference, PQCrypto 2018 Fort Lauderdale, FL, USA, April 9–11, 2018 Proceedings
Author : Tanja Lange - Rainer Steinwandt
Publisher : Springer
Issue Date : 2018
Author : John F. Dooley
Publisher : Springer
Issue Date : 2018
BUILD, TEST, AND EVALUATE SECURE SYSTEMS
Author : Josiah Dykstra
Publisher : O'Reilly & Associates, Inc.
Issue Date : 2015
Author : Andrew Lockhart
Publisher : O'Reilly & Associates, Inc.
Issue Date : 2007
A Guide for Secure Design and Deployment
Author : Chris Dotson
Publisher : O'Reilly & Associates, Inc.
Issue Date : 2019
Author : Chris Dotson
Publisher : John Wiley & Sons, Inc
Issue Date : 2017
Analysis, Detection, and Handling
Author : Julius Holderer
Publisher : Springer
Issue Date : 2022
Security Basics, Security in On-the-shelf and Emerging Technologies
Author : Hakima Chaouchi Maryline Laurent-Maknavicius
Publisher : John Wiley & Sons, Inc
Issue Date : 2009
Building Secure Systems in Untrusted Networks
Author : Evan Gilman and Doug Barth
Publisher : O'Reilly & Associates, Inc.
Issue Date : 2017