Coding theory & cryptology books

4163 books were found.

The DisplayJet Manifesto: A Manifesto for the Zero-Trust Graphical Age

The DisplayJet Manifesto: A Manifesto for the Zero-Trust...

Author: Gautham G Nair
ISBN: 9798242244139
Format: Paperback
$50.13

The pixels you see are not your own. Not truly. In an age where digital threats penetrate deeper than ever, ""The...  Read More >>

Making A Case For Holding Political Elections On The Blockchain

Making A Case For Holding Political Elections On The...

Author: Tony Jones
ISBN: 9798901489031
Format: Paperback
$26.37

As cyber-threats escalate and trust in institutions declines, traditional voting systems show their limitations....  Read More >>

Embedded Security: Protecting Your Devices from Bootloader to Firmware Updates

Embedded Security: Protecting Your Devices from Bootloader...

Author: Michael Bell
ISBN: 9798241990006
Format: Paperback
$31.68

Embedded devices now power everything from consumer electronics and industrial systems to critical infrastructure...  Read More >>

Prison Blues: Covert Encrypted Messaging over GIT with Spot-On Encryption Suite

Prison Blues: Covert Encrypted Messaging over GIT with...

Author: Uni Nurf
ISBN: 9783769378108
Format: Paperback
$30.36

PRISON BLUES turns one of the world's most ordinary developer tools into something unexpected: a covert, end-to-end...  Read More >>

The Digital Pact: Money, Power, and the Quest for Sovereignty

The Digital Pact: Money, Power, and the Quest for Sovereignty...

Author: Victor Vandersan
ISBN: 9798241802798
Format: Paperback
$47.39

THE FINANCIAL SYSTEM HAS BEEN REBOOTED. ARE YOU THE OWNER OR THE PRODUCT? Money is no longer just a medium of exchange-it...  Read More >>

Quantum Random-Number APIs Hardware Entropy as a Service for Cloud Apps

Quantum Random-Number APIs Hardware Entropy as a Service...

Author: Byte Weaver
ISBN: 9798241584144
Format: Paperback
$52.77

What if the random numbers securing your cloud applications are more predictable than you think? For decades, developers...  Read More >>

DeFi: Finance Décentralisée, Blockchain Et Le Nouveau Système Financier

DeFi: Finance Décentralisée, Blockchain Et Le Nouveau...

Author: Hermes Socraticus
ISBN: 9798241710550
Format: Paperback
$52.77

Cet ouvrage propose une analyse approfondie des finances décentralisées (DeFi) en tant que phénomène technique,...  Read More >>

TLDR+ Ransomware: Detection, Containment and Recovery

TLDR+ Ransomware: Detection, Containment and Recovery...

Author: Wojciech Ciemski
ISBN: 9798241564832
Format: Paperback
$50.13

Spot it early. Contain it fast. Recover clean. TLDR+ Ransomware is a hands-on field manual for handling ransomware...  Read More >>

The Hyperproof Manifesto: On Legitimacy, Consent & Executable Authority

The Hyperproof Manifesto: On Legitimacy, Consent & Executable...

Author: Dom Jocubeit
ISBN: 9781764098946
Format: Paperback
$44.85

The Hyperproof Manifesto addresses a second failure mode of large-scale digital systems: authority that exists only...  Read More >>

Applied Cryptography for Engineers: Hash and Trash

Applied Cryptography for Engineers: Hash and Trash

Author: Denys Popov
ISBN: 9798241256218
Format: Paperback
$50.13

Applied Cryptography for Engineers: Hash and Trash is a practical guide to cryptography as it is actually used and...  Read More >>

OWASP Top 10 Survival Guide: Fix Web Application Vulnerabilities Now

OWASP Top 10 Survival Guide: Fix Web Application Vulnerabilities...

Author: Larsen Kraulmann
ISBN: 9798231627974
Format: Paperback
$131.97

So... you thought your web app was secure? Cute. Let's be real - if your code touches the internet, it's already...  Read More >>

Das komplette ISO 27001 Konformitätspaket: Ein umfassender Leitfaden zur Implementierung und Dokumentation von ISMS mit wichtigen Vorlagen für die Zertifizierung

Das komplette ISO 27001 Konformitätspaket: Ein umfassender...

Author: Daniel Smith
ISBN: 9798241049445
Format: Paperback
$607.20

ISO 27001: Der vollständige Leitfaden zur Implementierung eines Informationssicherheits-ManagementsystemsSchritt-für-Schritt...  Read More >>

Understanding Cyber Threats Through Behavioral Intelligence

Understanding Cyber Threats Through Behavioral Intelligence...

Author: Taiwo Osiyemi
ISBN: 9785376339084
Format: Hardback
$42.21

Understanding Cyber Threats Through Behavioral Intelligence"" reframes the entire discipline of cybersecurity, arguing...  Read More >>

The Joy of Cryptography: An Undergraduate Course in Provable Security

The Joy of Cryptography: An Undergraduate Course in...

Author: Mike Rosulek
ISBN: 9780262049979
Format: Hardback
$190.00

""This is an undergraduate textbook that uses provable security as its approach. Provable security transforms cryptography...  Read More >>

Financial Cryptography and Data Security: 29th International Conference, FC 2025, Miyakojima, Japan, April 14–18, 2025, Revised Selected Papers, Part I

Financial Cryptography and Data Security: 29th International...

Author: Christina Garman ,  Pedro Moreno-Sanchez
ISBN: 9783032070234
Format: Paperback
$237.57

The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference...  Read More >>

Financial Cryptography and Data Security: 29th International Conference, FC 2025, Miyakojima, Japan, April 14–18, 2025, Revised Selected Papers, Part II

Financial Cryptography and Data Security: 29th International...

Author: Christina Garman ,  Pedro Moreno-Sanchez
ISBN: 9783032070340
Format: Paperback
$197.97

The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference...  Read More >>

Cyberspace Safety and Security: 15th International Symposium, CSS 2025, Hangzhou, China, July 4–7, 2025, Proceedings

Cyberspace Safety and Security: 15th International Symposium,...

Author: Yang Xiang ,  Jian Shen
ISBN: 9789819535507
Format: Paperback
$211.17

This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS...  Read More >>

Job Scheduling Strategies for Parallel Processing: 28th International Workshop, JSSPP 2025, Milan, Italy, June 3–4, 2025, Revised Selected Papers

Job Scheduling Strategies for Parallel Processing: 28th...

Author: Dalibor Klusáček ,  Julita Corbalán
ISBN: 9783032105066
Format: Paperback
$237.57

This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for...  Read More >>

Selected Areas in Cryptography – SAC 2025: 32nd International Conference, Toronto, ON, Canada, August 13–15, 2025, Revised Selected Papers

Selected Areas in Cryptography – SAC 2025: 32nd International...

Author: Christina Boura ,  Atefeh Mashatan
ISBN: 9783032105356
Format: Paperback
$237.57

This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography,...  Read More >>

Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part III

Information Security and Cryptology: 21st International...

Author: Rongmao Chen ,  Robert H. Deng
ISBN: 9789819562084
Format: Paperback
$290.37

The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security...  Read More >>

Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part II

Information Security and Cryptology: 21st International...

Author: Rongmao Chen ,  Robert H. Deng
ISBN: 9789819562022
Format: Paperback
$211.17

The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security...  Read More >>

Information Security and Cryptology: 21st International Conference, Inscrypt 2025, Xi'an, China, October 19-22, 2025, Revised Selected Papers, Part I

Information Security and Cryptology: 21st International...

Author: Rongmao Chen ,  Robert H. Deng
ISBN: 9789819562053
Format: Paperback
$237.57

The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security...  Read More >>

Guide to Feistel Ciphers: Security Proofs and Cryptanalysis

Guide to Feistel Ciphers: Security Proofs and Cryptanalysis...

Author: Jacques Patarin ,  Emmanuel Volte
ISBN: 9783031998492
Format: Hardback
$237.57

Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret...  Read More >>

Introduction to Security Science: Basic Concepts and Mathematical Foundations

Introduction to Security Science: Basic Concepts and...

Author: Dusko Pavlovic ,  Peter-Michael Seidel
ISBN: 9783032009487
Format: Hardback
$142.29

Everyone needs security: Nations need national security, corporations need corporate security, individuals need...  Read More >>

Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List