Coding theory & cryptology books

4194 books were found.

Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve

Cyber Defense: Advanced Strategies and Techniques to...

Author: Anahita Tasdighi
ISBN: 9781394375905
Format: Hardback
$182.95

Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital...  Read More >>

Security and Privacy in Social Networks and Big Data: 11th International Symposium, SocialSec 2025, Wuhan, China, December 5–7, 2025, Proceedings

Security and Privacy in Social Networks and Big Data:...

Author: Liming Zhai ,  Qing Guo
ISBN: 9789819570263
Format: Paperback
$171.57

This book LNCS 16327 constitutes the referred proceedings of the 11th International Symposium on Security and Privacy...  Read More >>

Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XVIII: International Workshop, COINE 2025, Detroit, MI, USA, May 20, 2025, Revised Selected Papers

Coordination, Organizations, Institutions, Norms, and...

Author: Sz-Ting Tzeng ,  Davide Dell’Anna
ISBN: 9783032175410
Format: Paperback
$145.17

This volume constitutes the revised selected papers of the 29th International Workshop on Coordination, Organizations,...  Read More >>

Mathematics for the Digital Systems Engineer: Essentials for Modern Cryptography, Computer Security and Communications Technology

Mathematics for the Digital Systems Engineer: Essentials...

Author: Chris J. Mitchell (University of London, UK)
ISBN: 9781394396528
Format: Hardback
$190.95

Straightforward resource on the mathematics underpinning the AI/digital world Mathematics for the Digital Systems...  Read More >>

Coding for Erasure Channels

Coding for Erasure Channels

Author: Enrico Paolini (University of Bologna) ,  Gianluigi Liva (German Aerospace Center, Wessling)
ISBN: 9781107131552
Format: Hardback
$258.75

A unique resource for analyzing, designing and implementing erasure codes for future computer networks, with an...  Read More >>

Neural Symbolic Knowledge Graph Reasoning: A Pathway Towards Neural Symbolic AI

Neural Symbolic Knowledge Graph Reasoning: A Pathway...

Author: Lihui Liu ,  Hanghang Tong
ISBN: 9783032158574
Format: Hardback
$118.77

This book explores various aspects of knowledge graph reasoning to solve different tasks, encompassing first, traditional...  Read More >>

Unveiling the Art of Steganography: A Modern Approach

Unveiling the Art of Steganography: A Modern Approach...

Author: Urmila Pilania ,  Manoj Kumar
ISBN: 9781032823652
Format: Paperback
$134.52

The book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From...  Read More >>

Unveiling the Art of Steganography: A Modern Approach

Unveiling the Art of Steganography: A Modern Approach...

Author: Urmila Pilania ,  Manoj Kumar
ISBN: 9781032821078
Format: Hardback
$310.50

The book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From...  Read More >>

Secure IT Systems: 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

Secure IT Systems: 30th Nordic Conference, NordSec 2025,...

Author: Raimundas Matulevičius ,  Liina Kamm
ISBN: 9783032147813
Format: Paperback
$197.97

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,...  Read More >>

AI-based 3D Point Cloud Coding: Methods, Standards, and Applications

AI-based 3D Point Cloud Coding: Methods, Standards,...

Author: Wei Gao
ISBN: 9789819506590
Format: Hardback
$475.17

mso-bidi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-bidi-theme-font:...  Read More >>

Human-Centered Security: How to Design Systems That Are Both Safe and Usable

Human-Centered Security: How to Design Systems That...

Author: Heidi Trost ,  Simran Singh
ISBN: 9798228825987
Format: Audio
$121.31

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching...  Read More >>

Human-Centered Security: How to Design Systems That Are Both Safe and Usable

Human-Centered Security: How to Design Systems That...

Author: Heidi Trost ,  Simran Singh
ISBN: 9798228825970
Format: Audio
$95.01

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching...  Read More >>

The DarkWhale Protocol: My Crypto Journey With Satoshi

The DarkWhale Protocol: My Crypto Journey With Satoshi...

Author: Marco Beffa
ISBN: 9789948650324
Format: Hardback
$92.37

A mysterious guide. A hidden protocol. A descent into the digital unknown. Welcome to the journey. The DarkWhale...  Read More >>

Cybersecurity Risk Management: Embedded Quality as Your Shield from Modern Threats

Cybersecurity Risk Management: Embedded Quality as Your...

Author: Jayet Moon ,  Jeet Shah
ISBN: 9781636942087
Format: Paperback
$184.80

This book is your guide to building secure, resilient systems that meet the highest standards of quality and compliance-because...  Read More >>

Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness

Quantum Ready: The Enterprise Guide to Post-Quantum...

Author: Walt Powell
ISBN: 9781041166696
Format: Paperback
$134.52

Quantum Ready is not just a warning, it’s a field guide for the era of quantum disruption. As quantum computing...  Read More >>

Post-Quantum Cryptography Migration: Preparing Enterprise Systems for Quantum Computing Threats

Post-Quantum Cryptography Migration: Preparing Enterprise...

Author: Adrian Volk
ISBN: 9798233541414
Format: Paperback
$79.17

Post-quantum cryptography is not a future upgrade. It is a structural migration of trust happening now, beneath...  Read More >>

Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness

Quantum Ready: The Enterprise Guide to Post-Quantum...

Author: Walt Powell
ISBN: 9781041166689
Format: Hardback
$310.50

Quantum Ready is not just a warning, it’s a field guide for the era of quantum disruption. As quantum computing...  Read More >>

Modern TPM Explained: Secure Boot, BitLocker, Measured Boot, Attestation, and Hardware Root of Trust for Modern Systems

Modern TPM Explained: Secure Boot, BitLocker, Measured...

Author: Vihaan Kulkarni
ISBN: 9798246792063
Format: Paperback
$68.64

Modern systems no longer fail at the application layer first-they fail at boot, firmware, and trust boundaries....  Read More >>

Cyber Security & AI v2: How AI affects Cyber Security

Cyber Security & AI v2: How AI affects Cyber Security...

Author: Mark Hayward
ISBN: 9798246847992
Format: Paperback
$52.77

This eBook explores the critical intersection of artificial intelligence and cybersecurity, providing a comprehensive...  Read More >>

Cyber Security Trends 2026 v2: a look at what's coming in 2026

Cyber Security Trends 2026 v2: a look at what's coming...

Author: Mark Hayward
ISBN: 9798246844991
Format: Paperback
$52.77

This comprehensive eBook explores the latest developments, strategies, and technologies in cybersecurity. Covering...  Read More >>

Cyber Security Advanced v2: Taking your Cyber Security to the next level

Cyber Security Advanced v2: Taking your Cyber Security...

Author: Mark Hayward
ISBN: 9798246839720
Format: Paperback
$52.77

This comprehensive eBook explores the latest trends, techniques, and best practices in modern cybersecurity. Covering...  Read More >>

Financial Cryptography and Data Security: 29th International Conference, FC 2025, Miyakojima, Japan, April 14–18, 2025, Revised Selected Papers, Part I

Financial Cryptography and Data Security: 29th International...

Author: Christina Garman ,  Pedro Moreno-Sanchez
ISBN: 9783032070234
Format: Paperback
$237.57

The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference...  Read More >>

Latest Reading Guide

MRG 26 2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List