Understanding Cryptography : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Christof Paar
Download Now
Format: eBook (PDF)
Complete Guide to CISM Certification
Thomas R. (Thomas R. Peltier Associates, LLC, Wyandotte, Mich Peltier
Download Now
Format: eBook (PDF)
Guide to Computer Forensics and Investigations
Nelson/Phillips/Steuart
Download Now
Format: eBook (PDF)
Embedded Security in Cars : Securing Current and Future Automotive IT Applications
Kerstin Lemke
Download Now
Format: eBook (PDF)
Power Analysis Attacks : Revealing the Secrets of Smart Cards
Stefan Mangard
Download Now
Format: eBook (PDF)
Information Security Architecture : An Integrated Approach to Security in the Organization, Second Edition
Jan Killmeyer
Download Now
Format: eBook (PDF)
Digital Media Steganography : Principles, Algorithms, and Advances
Mahmoud Hassaballah
Download Now
Format: eBook (EPUB)
Practical Cryptography : Algorithms and Implementations Using C++
Saiful Azad
Download Now
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download Now
Format: eBook (PDF)