Coding theory and cryptology Books

Sidebar Sidebar Sidebar
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $153.95

    Add to Cart The item has been added
  • The Role of Mining Pools in 51% Attack Prevention The Role of Mining Pools in 51% Attack Prevention
    Add to Cart The item has been added

    The Role of Mining Pools in 51% Attack Prevention

    If you're investing in Bitcoin or other cryptocurrencies, you know that security is paramount. But did you know that mining pools play a crucial role in preventing one of the biggest security threats: the 51% attack?In "The Role of Mining Pools in 51%...
    $23.34

    Add to Cart The item has been added
  • Enterprise Level Security 2 Enterprise Level Security 2
    Add to Cart The item has been added

    Enterprise Level Security 2

    Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its...
    $202.46

    Add to Cart The item has been added
  • The Birth of Bitcoin The Birth of Bitcoin
    Add to Cart The item has been added

    The Birth of Bitcoin

    Introducing "The Birth of Bitcoin" a fascinating and insightful exploration of the birth of the world's most revolutionary digital currency. From its humble beginnings in 2008, Bitcoin has exploded onto the global stage, challenging traditional financial...
    $23.34

    Add to Cart The item has been added
  • The Legacy of Satoshi Nakamoto The Legacy of Satoshi Nakamoto
    Add to Cart The item has been added

    The Legacy of Satoshi Nakamoto

    Are you curious about the mysterious figure behind the creation of Bitcoin? Do you want to learn about the impact of cryptocurrency on the world, and the future of this revolutionary technology? Look no further than "The Legacy of Satoshi Nakamoto."In...
    $23.34

    Add to Cart The item has been added
  • The Security Hippie The Security Hippie
    Add to Cart The item has been added

    The Security Hippie

    The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many...
    $281.75

    Add to Cart The item has been added
  • IoT Applications, Security Threats, and Countermeasures IoT Applications, Security Threats, and Countermeasures
    Add to Cart The item has been added

    IoT Applications, Security Threats, and Countermeasures

    The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog...
    $409.81

    Add to Cart The item has been added
  • Introduction to Cryptography Introduction to Cryptography
    Add to Cart The item has been added

    Introduction to Cryptography

    This book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several...
    $149.23

    Add to Cart The item has been added
  • Advanced Cybersecurity Technologies Advanced Cybersecurity Technologies
    Add to Cart The item has been added

    Advanced Cybersecurity Technologies

    Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human...
    $358.59

    Add to Cart The item has been added
  • An In-Depth Guide to Mobile Device Forensics An In-Depth Guide to Mobile Device Forensics
    Add to Cart The item has been added

    An In-Depth Guide to Mobile Device Forensics

    Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile...
    $307.36

    Add to Cart The item has been added
  • Practical Mathematical Cryptography Practical Mathematical Cryptography
    Add to Cart The item has been added

    Practical Mathematical Cryptography

    This book provides a clear and accessible introduction to practical mathematical cryptography. The presentation provides a unified and consistent treatment of the most important cryptographic topics, from the initial design and analysis of basic...
    $133.79

    Add to Cart The item has been added
  • Secure Searchable Encryption and Data Management Secure Searchable Encryption and Data Management
    Add to Cart The item has been added

    Secure Searchable Encryption and Data Management

    This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements...
    $59.19

    Add to Cart The item has been added
  • Cyber Defense Mechanisms Cyber Defense Mechanisms
    Add to Cart The item has been added

    Cyber Defense Mechanisms

    This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.
    $120.41

    Add to Cart The item has been added
  • Behavioral Cybersecurity Behavioral Cybersecurity
    Add to Cart The item has been added

    Behavioral Cybersecurity

    This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of...
    $148.98

    Add to Cart The item has been added
  • Cryptanalytic Attacks on RSA Cryptanalytic Attacks on RSA
    Add to Cart The item has been added

    Cryptanalytic Attacks on RSA

    RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks...
    $219.36

    Add to Cart The item has been added
  • Secure Group Communications Over Data Networks Secure Group Communications Over Data Networks
    Add to Cart The item has been added

    Secure Group Communications Over Data Networks

    The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri­...
    $249.48

    Add to Cart The item has been added
  • Multimedia Encryption and Watermarking Multimedia Encryption and Watermarking
    Add to Cart The item has been added

    Multimedia Encryption and Watermarking

    Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital...
    $323.20

    Add to Cart The item has been added
  • Cryptographic Engineering Cryptographic Engineering
    Add to Cart The item has been added

    Cryptographic Engineering

    This book is for engineers and researchers working in the embedded hardware industry.  This book addresses the design aspects of cryptographic hardware and embedded software.  The authors provide tutorial-type...
    $491.95

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    The Official Bitcoin Coloring Book

    The long awaited volume from Satoshi Nakamoto, renowned polymath and creator of Bitcoin is finally here! Printed on a brilliant white paper, The Official Bitcoin Coloring Book* is packed with unique, right-brain insights into this revolutionary digital...
    $23.00

    Add to Cart The item has been added
  • The Mathematics of Secrets
    Add to Cart The item has been added

    The Mathematics of Secrets

    Explaining the mathematics of cryptographyThe Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples,...
    RRP: $34.99
    $34.00

    Add to Cart The item has been added
Coding theory and cryptology