BOOKS - PROGRAMMING - Cryptography The Key to Digital Security, How It Works, and Why...
Cryptography The Key to Digital Security, How It Works, and Why It Matters - Keith Martin  EPUB/AZW3/MOBI/PDFCONV. W. W. Norton & Company BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
57378

Telegram
 
Cryptography The Key to Digital Security, How It Works, and Why It Matters
Author: Keith Martin
Pages: 320
Format: EPUB/AZW3/MOBI/PDFCONV.
File size: 10 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Globalisation and Economic Security in East Asia (Routledge Studies in Globalisation)
CompTIA Security+ SY0-701 Cert Guide (Certification Guide)
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Everyman|s Guide to Internet Security The Internet stripped bare
Web Application Security Exploitation and Countermeasures for Modern Web Applications
Food Security and Food Production: Institutional Challenges in Governance Domain
The Morpheus Decision: A Pia Sabel Mystery (Sabel Security Book 10)
Network Security through Data Analysis From Data to Action, 2nd Edition
Unidentified: The Emerald Tear The Emerald Butterfly (Treasure Hunter Security, #7)
Wireless Security Architecture Designing and Maintaining Secure Wireless for Enterprise
Australia and Nuclear War (Routledge Library Editions Nuclear Security)
Network Security Assessment Know Your Network, 3rd Edition (Early Release)
Microsoft Azure Security Center Second Edition (IT Best Practices - Microsoft Press)
Civil Society, Peace, and Power (Peace and Security in the 21st Century)
The Rembrandt Decision: A Pia Sabel Mystery (Sabel Security Book 12)
The Russian FSB: A Concise History of the Federal Security Service (Concise Histories of Intelligence)
CWSP Certified Wireless Security Professional Study Guide Exam CWSP-205
Cisco Next-Generation Security Solutions All-in-one Cisco ASA Firepower Services, NGIPS, and AMP
Hacking Exposed Web Applications Web Application Security Secrets and Solutions, Third Edition
Bodyguard Wolf Shifter: A Paranormal Romance (Special Wolf Security Agency Book 1)
Journalism and the Nsa Revelations: Privacy, Security and the Press (Reuters Institute for the Study of Journalism)
Building Intelligent Systems Using Machine Learning and Deep Learning Security, Applications and Its Challenges
The Hardware Hacking Handbook Breaking Embedded Security with Hardware Attacks (Early Access)
Building Intelligent Systems Using Machine Learning and Deep Learning Security, Applications and Its Challenges
Critical Security Controls for Effective Cyber Defense A Comprehensive Guide to CIS 18 Controls
Tratamento de Choque: Desprogramando tias do zap, tios do churasco, justiceiros sociais e zumbis da internet (Anatomia da Vida Digital Livro 1)
Настольная книга project-менеджера. Что нужно знать, чтобы управлять IT, digital и другими проектами с учетом российских реалий
The Cinema of Steven Soderbergh: Indie Sex, Corporate Lies, and Digital Videotape (Directors| Cuts) by Andrew deWaard (2013-05-07)
Digital Militarism: Israel|s Occupation in the Social Media Age (Stanford Studies in Middle Eastern and Islamic Societies and Cultures)
Indigenous Conflict Management Strategies in West Africa: Beyond Right and Wrong (Conflict and Security in the Developing World)
Data-Centric Security in Software Defined Networks (SDN) (Studies in Big Data, 149)
The U.S.-Singapore Free Trade Agreement: An American Perspective on Power, Trade and Security in the Asia Pacific
Web Application Security Exploitation and Countermeasures for Modern Web Applications, 2nd Edition (Final)
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)
Functional Programming in Go: Apply functional techniques in Golang to improve the testability, readability, and security of your code
Police Reform in Turkey: Human Security, Gender and State Violence Under Erdogan (Contemporary Turkey)
Cloud Native Application Protection Platforms A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Cloud Native Application Protection Platforms A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Computer Engineering 2 books in 1 Linux for Beginners+Cyber Security, How to Win with Cyberattacks and How to Use Linux Like a Pro
AWS All-in-one Security Guide Design, Build, Monitor, and Manage a Fortified Application Ecosystem on AWS