BOOKS - PROGRAMMING - Cryptography The Key to Digital Security, How It Works, and Why...
Cryptography The Key to Digital Security, How It Works, and Why It Matters - Keith Martin  EPUB/AZW3/MOBI/PDFCONV. W. W. Norton & Company BOOKS PROGRAMMING
ECO~15 kg CO²

1 TON

Views
57360

Telegram
 
Cryptography The Key to Digital Security, How It Works, and Why It Matters
Author: Keith Martin
Pages: 320
Format: EPUB/AZW3/MOBI/PDFCONV.
File size: 10 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Digital Cop A Digital Cop|s Guide to Cyber Security
Key Documents on the Reform of the Un Security Council 1991-2019
Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings (Communications in Computer and Information Science)
The Technology Fallacy: How People Are the Real Key to Digital Transformation (Management on the Cutting Edge)
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I (Lecture Notes in Computer Science, 13905)
Ethical Hacking Bible Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux
Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
Kickstart Blockchain and Cryptography Fundamentals Navigate the Intricacies of Modern Blockchain, Cryptography, Smart Contracts and Hyperledger for Driving Real-World Transformations
Kickstart Blockchain and Cryptography Fundamentals Navigate the Intricacies of Modern Blockchain, Cryptography, Smart Contracts and Hyperledger for Driving Real-World Transformations
Security and Privacy in the Digital Era
CRYPTOCURRENCY SECURITY: Safeguarding Your Digital Wealth
Security, Privacy, and Digital Forensics in the Cloud
Digital Image Security Techniques and Applications
Security for the Digital World Within an Ethical Framework
Digital Image Security Techniques and Applications
Digital Image Security: Techniques and Applications
Strategic Approaches to Digital Platform Security Assurance
Personal Digital Security: Protecting Yourself from Online Crime
What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition
Securing an Enterprise Maximizing Digital Experiences Through Enhanced Security Measures
Cyber Resilience (River Publishers Series in Security and Digital Forensics)
Digital Finance Security Tokens and Unlocking the Real Potential of Blockchain
Cyberdynamx The Art and Science of Building a Simplified Digital Security Program
Blockchain Technology and Applications (River Publishers Series in Security and Digital Forensics)
Securing the Digital Realm Advances in Hardware and Software Security, Communication, and Forensics
Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives
Security and Privacy for Modern Networks Strategies and Insights for Safeguarding Digital Infrastructures
Blockchain and Digital Twin Enabled IoT Networks Privacy and Security Perspectives
Building a Cyber Risk Management Program Evolving Security for the Digital Age
Zero-trust - An Introduction (River Publishers Rapids Series in Digital Security and Forensics)
Building a Cyber Risk Management Program Evolving Security for the Digital Age
Blockchain and Digital Twin Enabled IoT Networks Privacy and Security Perspectives
Security and Privacy for Modern Networks Strategies and Insights for Safeguarding Digital Infrastructures
Energy|s Digital Future: Harnessing Innovation for American Resilience and National Security
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond
Arithmetic, Geometry, Cryptography, and Coding Theory 2021: 18th International Conference Arithmetic, Geometry, Cryptography, and Coding Theory May 31 … France (Contemporary Mathematics, 779)
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
Fifty Key Contemporary Thinkers: From Structuralism to Postmodernity (Routledge Key Guides)
Sport and Exercise Psychology The Key Concepts (Routledge Key Guides)
Fifty Key Thinkers in Psychology (Routledge Key Guides)