Understanding Cryptography : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Christof Paar
Download - Immediately Available
Format: eBook (PDF)
Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier
IRB Media
Download - Immediately Available
Format: eBook (EPUB)
Management of Information Security
Whitman/Mattord
Download - Immediately Available
Format: eBook (PDF)
Cryptography: A Very Short Introduction
Fred Piper
Download - Immediately Available
Format: eBook (EPUB)
The Art of Deception : Controlling the Human Element of Security
Kevin D. Mitnick
Download - Immediately Available
Format: eBook (EPUB)
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick
Download - Immediately Available
Format: eBook (EPUB)
88 Privacy Breaches to Beware Of
Kevin Sherpherdson
Download - Immediately Available
Format: eBook (EPUB)
Information Processing and Security Systems
Khalid Saeed
Download - Immediately Available
Format: eBook (PDF)
PRAGMATIC Security Metrics : Applying Metametrics to Information Security
W. Krag, CISM (Enterprise Security Architect, Thousand Oaks, C Brotby
Download - Immediately Available
Format: eBook (PDF)
The Truth Machine : The Blockchain and the Future of Everything
Michael J. Casey
Download - Immediately Available
Format: eBook (EPUB)
Complete Guide to CISM Certification
Thomas R. (Thomas R. Peltier Associates, LLC, Wyandotte, Mich Peltier
Download - Immediately Available
Format: eBook (PDF)
The Art of Deception : Controlling the Human Element of Security
Kevin D. Mitnick
Download - Immediately Available
Format: eBook (PDF)
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick
Download - Immediately Available
Format: eBook (PDF)
Guide to Computer Forensics and Investigations
Nelson/Phillips/Steuart
Download - Immediately Available
Format: eBook (PDF)
The Official (ISC)2 Guide to the SSCP CBK
Adam Gordon
Download - Immediately Available
Format: eBook (EPUB)
An Introduction to Mathematical Cryptography
Jeffrey Hoffstein
Download - Immediately Available
Format: eBook (PDF)
The Cybersecurity Maturity Model Certification (CMMC) - A pocket guide
William Gamble
Download - Immediately Available
Format: eBook (PDF)
Embedded Security in Cars : Securing Current and Future Automotive IT Applications
Kerstin Lemke
Download - Immediately Available
Format: eBook (PDF)
Information Security Architecture : An Integrated Approach to Security in the Organization, Second Edition
Jan Killmeyer
Download - Immediately Available
Format: eBook (PDF)
Digital Watermarking and Steganography
Ingemar Cox
Download - Immediately Available
Format: eBook (PDF)
Power Analysis Attacks : Revealing the Secrets of Smart Cards
Stefan Mangard
Download - Immediately Available
Format: eBook (PDF)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Absolute Beginner's Guide to Personal Firewalls
Jerry Lee Ford Jr.
Download - Immediately Available
Format: eBook (EPUB)