BOOKS - PROGRAMMING - Cryptography and Network Security, 5th Edition
Cryptography and Network Security, 5th Edition - William Stallings 2010 PDF Pearson BOOKS PROGRAMMING
ECO~17 kg CO²

2 TON

Views
92064

Telegram
 
Cryptography and Network Security, 5th Edition
Author: William Stallings
Year: 2010
Format: PDF
File size: 17 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Quantum Computing and Cryptography in Future Computers
Innovative Machine Learning Applications for Cryptography
Practical Cryptography in Software Development The How-To Guide
Neural Network Computer Vision with OpenCV 5: Build computer vision solutions using Python and DNN module (English Edition)
Sabato al Parco - Un racconto della ‘Justice Security| (Italian Edition)
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Mike Meyers| CompTIA Security+ Certification Guide(Exam SY0-601), Third Edition
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests, 2nd Edition
The Web Application Hacker|s Handbook Finding and Exploiting Security Flaws, 2nd Edition
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 2nd Edition
Cryptography Engineering Design Principles and Practical Applications
Symmetric Cryptography, Volume 2: Cryptanalysis and Future Directions
Ultimate Neural Network Programming with Python: Create Powerful Modern AI Systems by Harnessing Neural Networks with Python, Keras, and TensorFlow (English Edition)
The DevOps Handbook How to Create World-Class Agility, Reliability, & Security in Technology Organizations, Second Edition
CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-003, 3rd Edition
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
Learn Penetration Testing with Python 3.x An Ethical Hacker|s Blueprint for Offensive Security, 2nd Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Learn Penetration Testing with Python 3.x An Ethical Hacker|s Blueprint for Offensive Security, 2nd Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Ultimate Azure IaaS for Infrastructure Management: Unleash Azure|s Compute, Storage and Network Components to Architect and Secure Your Cloud Infrastructure (English Edition)
Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .NET
Wittgenstein|s Secret Diaries: Semiotic Writing in Cryptography
Intelligence and Information Policy for National Security: Key Terms and Concepts (Security and Professional Intelligence Education Series)
Handbook of Research on Intelligent Data Processing and Information Security Systems (Advances in Information Security, Privacy, and Ethics)
Community Resilience When Disaster Strikes: Security and Community Health in UK Flood Zones (Advanced Sciences and Technologies for Security Applications)
Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less
Ansible For Security by Examples: 100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure
Cyber Space and Outer Space Security (River Publishers Series in Digital Security and Forensics)
Machine Learning for Computer and Cyber Security Principle, Algorithms, and Practices (Cyber Ecosystem and Security)
Cyber Security The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard
Cyber Security Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Cyber Security Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Serious Cryptography A Practical Introduction to Modern Encryption (Corrections, 2-Jan-2020)
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings (Security and Cryptology)