Items 1 - 15 of 67
1 2 3 4 5
Sort: 

Learning and Experiencing Cryptography with CrypTool and SageMath
Learning and Experiencing Cryptography with CrypTool and SageMath
By (author): Bernhard Esslinger
Published: 01/31/2024
Pages: 640
SSL and TLS: Theory and Practice, Third Edition
SSL and TLS: Theory and Practice, Third Edition
By (author): Rolf Oppliger
Published: 07/31/2023
Pages: 388
Modern Vulnerability Management: Predictive Cybersecurity
Modern Vulnerability Management: Predictive Cybersecurity
By (author)s: Michael Roytman, Ed Bellis
Published: 09/30/2022
Pages: 265
Lifecycle IoT Security for Engineers
Lifecycle IoT Security for Engineers
By (author): Kaustubh Dhondge
Published: 09/30/2021
Pages: 230
Cryptography 101: From Theory to Practice
Cryptography 101: From Theory to Practice
By (author): Rolf Oppliger
Published: 06/30/2021
Pages: 650
Medical Device Cybersecurity for Engineers and Manufacturers
Medical Device Cybersecurity for Engineers and Manufacturers
Published: 08/31/2020
Pages: 270
Coming Soon: Available 08/31/2020
End-to-End Encrypted Messaging
End-to-End Encrypted Messaging
By (author): Rolf Oppliger
Published: 04/30/2020
Pages: 360
Cyberwarfare: An Introduction to Information-Age Conflict
Cyberwarfare: An Introduction to Information-Age Conflict
By (author): Isaac R. Porche III
Published: 12/31/2019
Pages: 380
The Penetration Tester's Guide to Web Applications
The Penetration Tester's Guide to Web Applications
By (author): Serge Borso
Published: 06/30/2019
Pages: 280
Fuzzing for Software Security Testing and Quality Assurance, Second Edition
Fuzzing for Software Security Testing and Quality Assurance, Second Edition
Published: 01/31/2018
Pages: 330
Coming Soon: Available 01/31/2018
Attribute-Based Access Control
Attribute-Based Access Control
Published: 10/01/2017
Pages: 280
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
By (author): Edward Humphreys
Published: 02/29/2016
Pages: 224
Information Hiding
Information Hiding
Published: 12/20/2015
Pages: 312
Security for Cloud Computing
Security for Cloud Computing
Published: 09/30/2015
Pages: 184
1 2 3 4 5