BOOKS - NETWORK TECHNOLOGIES - Cryptography and Network Security
Cryptography and Network Security - Marcelo Sampaio de Alencar 2022 PDF River Publishers BOOKS NETWORK TECHNOLOGIES
ECO~15 kg CO²

1 TON

Views
69681

Telegram
 
Cryptography and Network Security
Author: Marcelo Sampaio de Alencar
Year: 2022
Pages: 324
Format: PDF
File size: 10,79 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

The Illustrated Network How TCP/IP Works in a Modern Network, Second Edition
Arithmetic, Geometry, Cryptography, and Coding Theory 2021: 18th International Conference Arithmetic, Geometry, Cryptography, and Coding Theory May 31 … France (Contemporary Mathematics, 779)
CompTIA Network+ Certification Guide (Exam N10-008) Unleash your full potential as a Network Administrator
CompTIA Network+ Certification Guide (Exam N10-008) Unleash your full potential as a Network Administrator
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
Wireless Sensor Network Network Hacking with Raspberry PI
Practical Go Building Scalable Network and Non-Network Applications
CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition)
Network basics for hackers: The Comprehensive Guide to Mastering Network Intricacies, Demystifying Cyber Threats, and Forging Ahead in Digital Defense Realms
Network basics for hackers The Comprehensive Guide to Mastering Network Intricacies, Demystifying Cyber Threats, and Forging Ahead in Digital Defense Realms
Network basics for hackers The Comprehensive Guide to Mastering Network Intricacies, Demystifying Cyber Threats, and Forging Ahead in Digital Defense Realms
International Conference on Advanced Intelligent Systems for Sustainable Development: Volume 2 - Advanced Intelligent Systems on Network, Security, … (Lecture Notes in Networks and Systems)
Network Architect|s Handbook: An expert-led journey to building a successful career as a network architect
Network Programmability with YANG The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI
Python Network Programming Use Python 3.7 To Get Network Applications Up and Running Quickly and Easily
Hacking with Kali Linux Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion: Learn and Apply Network Design Concepts to Prepare for the Exam (Certification Study Companion Series)
Cryptography
Cryptography
A Course in Cryptography
Singer|s Security: An MM First Time Bodyguard Romance (Alden Security Book 2)
Social Security Disability Insurance (American Political, Economic, and Security Issues)
Thor|s Microsoft Security Bible A Collection of Practical Security Techniques
Enhancing IoT Security A holistic approach to security for connected platforms
Agile Application Security Enabling Security in a Continuous Delivery Pipeline
Enhancing IoT Security A holistic approach to security for connected platforms
Rethinking (In)Security in the European Union: The Migration-Identity-Security Nexus
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Japan s Evolving Notion of National Security (Asian Political, Economic and Security Issues)
The Supply Side of Security: A Market Theory of Military Alliances (Studies in Asian Security)
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles
Her Private Security Detail: A Thrilling Bodyguard Romance (The Toure Security Group Book 2)
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Enhancing IoT Security: A holistic approach to security for connected platforms (English Edition)
Normalizing Japan: Politics, Identity, and the Evolution of Security Practice (Studies in Asian Security)
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Living Weapons: Biological Warfare and International Security (Cornell Studies in Security Affairs)
The Hidden Potential of DNS In Security: Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals