BOOKS - PROGRAMMING - Cryptography The Key to Digital Security, How It Works, and Why...
Cryptography The Key to Digital Security, How It Works, and Why It Matters - Keith Martin  EPUB/AZW3/MOBI/PDFCONV. W. W. Norton & Company BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
57363

Telegram
 
Cryptography The Key to Digital Security, How It Works, and Why It Matters
Author: Keith Martin
Pages: 320
Format: EPUB/AZW3/MOBI/PDFCONV.
File size: 10 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Developing the Digital Lung: From First Lung CT to Clinical AI
The Art of Photography (Digital Photography) (Volume 2)
Digital Camera Special - Camera Shopper
The Digital Transformation of the Healthcare System: Healthcare 5.0
The Art of Photography (Digital Photography) (Volume 2)
Intelligent Network Management and Control Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
Visualizing cityscapes of Classical antiquity: from early modern reconstruction drawings to digital 3D models: With a case study from the ancient town … in Boeotia, Greece (Access Archaeology)
Stan Lee|s Master Class Lessons in Drawing, World-Building, Storytelling, Manga, and Digital Comics from the Legendary Co-creator of Spider-Man, The Avengers, and The Incredible Hulk
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
Linux for Absolute Beginners: 5 Books in 1 The Ultimate Guide to Advanced Linux Programming, Kernel Mastery, Robust Security Measures, System Automation, and In-Depth Hands-on Exercises
Adobe Photoshop 2024 Guide for Beginners: A Detailed Step-by-Step Manual to Mastering Professional Photo Editing and Graphic Design for Digital Photographers
Python for Data Analysis From the Beginner to Expert Crash Course 3.0 that will Change your Life as a Digital Programmer Thanks to the Minimalism of this Manual. Deep Machine Learning and Big Data
Real-world Learning Framework for Secondary Schools: Digital Tools and Practical Strategies for Successful Implementation - bring about deeper and self-directed learning in students
The Virtues of Openness: Education, Science, and Scholarship in the Digital Age (Interventions: Education, Philosophy, and Culture) by Peters, Michael A., Roberts, Peter (2012) Paperback
How to Become a Rock Star Chef in the Digital Age: A Step-by-Step Marketing System for Chefs and Restaurateurs to Burn Their Competition and Build Their Brand to Superstar Level
Marketing for Small B2B Businesses: How Content Creates Marketing Muscle and Powers Traditional and Digital Marketing
Linguistische Methodenreflexion im Aufbruch: Beitrage zur aktuellen Diskussion im Schnittpunkt von Ethnographie und Digital Humanities, Multimodalitat … - Impulse and Tendenzen, 107) (German Edi
Weaponizing Water: Water Stress and Islamic Extremist Violence in Africa and the Middle East (Iraq;Nigeria;Somalia;Syria;Boko Haram;ISIS;Al-Shabaab;environmental security)
Ultimate Blockchain Security Handbook: Advanced Cybersecurity Techniques and Strategies for Risk Management, Threat Modeling, Pen Testing, and Smart Contract Defense for Blockchain (English Edition)
Gestiona Tus Contenidos y Dispositivos: Como Romper Con tu Smartphone, Tablet y Ordenadores y Empezar tu Desintoxicacion Digital Con Un Plan de 28 Dias (Spanish Edition)
Computational Intelligence and Blockchain in Complex Systems: System Security and Interdisciplinary Applications (Advanced Studies in Complex Systems)
CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004 (Sybex Study Guide)
CompTIA Security+ SY0-701 Practice Tests and PBQs: Exam SY0-701 (Online Access Included)
Spring Boot 3.0 Crash Course Mastering Spring Boot, from Application Development to Advanced Security, Data Access, Integration and Deployment
Blue Team Handbook SOC, SIEM, and Threat Hunting (V1.02) A Condensed Guide for the Security Operations Team and Threat Hunter
Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges (Prospects in Smart Technologies)
The GCC and the International Relations of the Gulf: Diplomacy, Security and Economic Coordination in a Changing Middle East (Library of International Relations)
Hands-On Penetration Testing on Windows Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Spring Boot 3.0 Crash Course: Mastering Spring Boot, from Application Development to Advanced Security, Data Access, Integration and Deployment
Spring Boot 3.0 Crash Course Mastering Spring Boot, from Application Development to Advanced Security, Data Access, Integration and Deployment
The Trafficking of Children: International Law, Modern Slavery, and the Anti-Trafficking Machine (Transnational Crime, Crime Control and Security)
Deep Learning for Multimedia Processing Applications Volume 1 Image Security and Intelligent Systems for Multimedia Processing
Deep Learning for Multimedia Processing Applications Volume 1 Image Security and Intelligent Systems for Multimedia Processing
CompTIA Security+ SY0-701 Certification Guide - Third Edition: Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt
The Last Superpower Summits: Reagan, Gorbachev and Bush. Conversations that Ended the Cold War. (National Security Archive Cold War Readers)
Learning in the Age of Digital and Green Transition: Proceedings of the 25th International Conference on Interactive Collaborative Learning (ICL2022), … (Lecture Notes in Networks and Systems, 6
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, … and Communication Technology, 658)
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers (Lecture Notes in Computer Science Book 13837)
Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi|an, China, December 30-31, 2022, Proceedings (Lecture … Telecommunications Engineering Book 4
Ultimate Docker for Cloud Native Applications: Unleash Docker Ecosystem by Optimizing Image Creation, Storage and Networking Management, Deployment Strategies … Scalability, and Security (Englis