BOOKS - PROGRAMMING - Cryptography The Key to Digital Security, How It Works, and Why...
Cryptography The Key to Digital Security, How It Works, and Why It Matters - Keith Martin  EPUB/AZW3/MOBI/PDFCONV. W. W. Norton & Company BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
57372

Telegram
 
Cryptography The Key to Digital Security, How It Works, and Why It Matters
Author: Keith Martin
Pages: 320
Format: EPUB/AZW3/MOBI/PDFCONV.
File size: 10 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Web Application Security Exploitation and Countermeasures for Modern Web Applications, 2nd Edition (Final)
Defense 2045: Assessing the Future Security Environment and Implications for Defense Policymakers (CSIS Reports)
East Asia in Transition: Economic and Security Challenges (HSBC Bank Canada Papers on Asia)
Super Bomb: Organizational Conflict and the Development of the Hydrogen Bomb (Cornell Studies in Security Affairs)
The Hybrid Age: International Security in the Era of Hybrid Warfare
When He|s Wild (Walker Security: Adrian|s Trilogy, #3)
Cloud Native Security Cookbook Recipes for a Secure Cloud
The Routledge Handbook of Transatlantic Security (Routledge Handbooks) (2010-07-30)
Hacking Exposed Web 2.0 Web 2.0 Security Secrets and Solutions
Sharing Big Data Safely Managing Data Security
The case for the welfare state: From social security to social equality
Enterprise Fortress The Ultimate Handbook for Enterprise Security Architecture
International Relations Theory of War (Praeger Security International)
Guide to Computer Network Security (Texts in Computer Science)
When He|s Bad (Walker Security: Adrian|s Trilogy, #2)
Mastering Linux Security Step by Step Practical Guide
The Network Security Test Lab A Step-by-Step Guide
The Hitwoman vs The Security Guard (Confessions of a Slightly Neurotic Hitwoman, #32)
UNIX System Security A Guide for Users and System Administrators
Hacking Exposed Linux Linux Security Secrets and Solutions
Tourism Security: Strategies for Effectively Managing Travel Risk and Safety by Tarlow Ph.D. in Sociology Texas A and M University, Peter 1st edition (2014) Paperback
New Foundations for Asian and Pacific Security. Based on the Addresses, Papers, Reports, and Discussion Sessions of an International Conference Held at Pattaya, Thailand, December 12-16, 1979 .
Spanish Short Stories For Beginners 10 Clever Short Stories to Grow Your Vocabulary and Learn Spanish the Fun Way: Parallel Text, Key-Vocabulary, Pronunciation Tips and Spanish Phrasebook
The Offences Against the State Act 1939 at 80: A Model Counter-Terrorism Act? (Hart Studies in Security and Justice)
Ultimate Penetration Testing with Nmap Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
A New Approach to the Nuclear Fuel Cycle: Best Practices for Security, Nonproliferation, and Sustainable Nuclear Energy (CSIS Reports)
The Russian Secret Police Muscovite, Imperial Russian and Soviet Political Security Operations, 1565-1970
The Refugee Crisis and Religion: Secularism, Security and Hospitality in Question (Critical Perspectives on Religion in International Politics)
Privacy and Security for Large Language Models Hands-On Privacy-Preserving Techniques for Personalized AI (Early Release)
Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control
Security for Cloud Native Applications The practical guide for securing modern applications using AWS, Azure, and GCP
Criminality, Public Security, and the Challenge to Democracy in Latin America (Kellogg Institute Series on Democracy and Development)
IoT Technologies in Smart-Cities From sensors to big data, security and trust (Control, Robotics and Sensors)
Security for Cloud Native Applications The practical guide for securing modern applications using AWS, Azure, and GCP
The Scarcity Slot: Excavating Histories of Food Security in Ghana (California Studies in Food and Culture Book 75)
Pro Spring Security Securing Spring Framework 6 and Boot 3-based Java Applications, 3rd Edition
Pro Spring Security Securing Spring Framework 6 and Boot 3-based Java Applications, 3rd Edition
Ultimate Penetration Testing with Nmap Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security
Digital Resources from Cultural Institutions for Use in Teaching and Learning: A Report of the American German Workshop. The Andrew W. Mellon Foundation Stiftung Preussischer Kulturbesitz