Coding theory and cryptology Books

Sidebar Sidebar Sidebar
  • Cyber Security, Forensics and National Security Cyber Security, Forensics and National Security
    Add to Cart The item has been added

    Cyber Security, Forensics and National Security

    There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures.
    $315.00

    Add to Cart The item has been added
  • Cybersecurity Fundamentals Cybersecurity Fundamentals
    Add to Cart The item has been added

    Cybersecurity Fundamentals

    Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and...
    $198.00

    Add to Cart The item has been added
  • Smiling Security Smiling Security
    Add to Cart The item has been added

    Smiling Security

    Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions. Business owners, boards, CEOs, and cyber security managers must work...
    $49.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Blockchain and IoT Integration

    The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by "smart" machines. This book explores the platforms and applications of blockchain-enabled...
    $126.00

    Add to Cart The item has been added
  • sale
    The Zero Trust Framework The Zero Trust Framework
    Add to Cart The item has been added

    The Zero Trust Framework

    In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
    RRP: $81.39
    $51.00

    Add to Cart The item has been added
  • Bitcoin Trading for Beginners, Dummies & Idiots Bitcoin Trading for Beginners, Dummies & Idiots
    Add to Cart The item has been added

    Bitcoin Trading for Beginners, Dummies & Idiots

    Whether you are looking to invest in bitcoin and other cryptocurrencies or understand why it will have a massive impact on your life in the near future, this book will clear out everything you need to know about what makes this technology what it...
    $20.00

    Add to Cart The item has been added
  • Crypto Millionaires Crypto Millionaires
    Add to Cart The item has been added

    Crypto Millionaires

    The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt to record human activities and the value that flows from them. This time, however, the goal is to make it accessible to everyone on...
    $308.00

    Add to Cart The item has been added
  • Stuxnet to Sunburst Stuxnet to Sunburst
    Add to Cart The item has been added

    Stuxnet to Sunburst

    Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U...
    $282.00

    Add to Cart The item has been added
  • Evidence-Based Cybersecurity Evidence-Based Cybersecurity
    Add to Cart The item has been added

    Evidence-Based Cybersecurity

    The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and...
    $163.00

    Add to Cart The item has been added
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $168.00

    Add to Cart The item has been added
  • Burners and Black Markets Burners and Black Markets
    Add to Cart The item has been added

    Burners and Black Markets

    Tired of being spied on? Encrypt yourself and explore a deep web of exotic goods, banned items & secret files, anonymously and free. Instantly. If you want to live the life of a superhacker, spy or CIA agent, be James Bond or Ethan Hunt for a time...
    $45.00

    Add to Cart The item has been added
  • Basics on Public Key Infrastructure (PKI) Basics on Public Key Infrastructure (PKI)
    Add to Cart The item has been added

    Basics on Public Key Infrastructure (PKI)

    Discover the intricacies of Public Key Infrastructure (PKI) with this comprehensive book. Explore the basics of cryptography and digital signatures, learn about the vital role digital certificates play in establishing trust, and gain a deeper...
    $28.00

    Add to Cart The item has been added
  • Practical Cybersecurity Architecture Practical Cybersecurity Architecture
    Add to Cart The item has been added

    Practical Cybersecurity Architecture

    Plan and design robust security architectures to secure your organization's technology landscape and the applications you developKey FeaturesLeverage practical use cases to successfully architect complex security structuresLearn risk assessment...
    $131.00

    Add to Cart The item has been added
  • Modern Cryptography for Cybersecurity Professionals Modern Cryptography for Cybersecurity Professionals
    Add to Cart The item has been added

    Modern Cryptography for Cybersecurity Professionals

    As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at...
    $93.00

    Add to Cart The item has been added
  • Cryptography Algorithms - Second Edition Cryptography Algorithms - Second Edition
    Add to Cart The item has been added

    Cryptography Algorithms - Second Edition

    Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptographyPurchase of the print or Kindle book includes a free eBook in PDF...
    $104.00

    Add to Cart The item has been added
  • Digital Identity and Access Management Digital Identity and Access Management
    Add to Cart The item has been added

    Digital Identity and Access Management

    Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital...
    $441.00

    Add to Cart The item has been added
  • Investigating Cyber Law and Cyber Ethics Investigating Cyber Law and Cyber Ethics
    Add to Cart The item has been added

    Investigating Cyber Law and Cyber Ethics

    Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly...
    $441.00

    Add to Cart The item has been added
  • Privacy, Intrusion Detection and Response Privacy, Intrusion Detection and Response
    Add to Cart The item has been added

    Privacy, Intrusion Detection and Response

    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response:...
    $441.00

    Add to Cart The item has been added
  • Cyber Crime and the Victimization of Women Cyber Crime and the Victimization of Women
    Add to Cart The item has been added

    Cyber Crime and the Victimization of Women

    While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber...
    $441.00

    Add to Cart The item has been added
  • New Technologies for Digital Crime and Forensics New Technologies for Digital Crime and Forensics
    Add to Cart The item has been added

    New Technologies for Digital Crime and Forensics

    Central to understanding and combating digital crime is the ability to develop new methods for the collection and analysis of electronic evidence. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories,...
    $407.00

    Add to Cart The item has been added
  • CODASPY'19 CODASPY'19
    Add to Cart The item has been added

    CODASPY'19

    <p>It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series...
    $230.00

    Add to Cart The item has been added
  • Hacking for Beginners Hacking for Beginners
    Add to Cart The item has been added

    Hacking for Beginners

    Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need...
    $26.00

    Add to Cart The item has been added
  • Unter dem Radar Unter dem Radar
    Add to Cart The item has been added

    Unter dem Radar

    Unter dem Radar - Ausgewählte Artikel & Interviews zu Datenschutz, Informationstechnologie, Netzpolitik und Hacking.Taschenbuchausgabe.Eine Einführung in die Welt der Informationstechnologie mit folgenden Sektionen:- Überwachung & Tarnkappen- Encryption:...
    $64.00

    Add to Cart The item has been added
  • Hack the Cybersecurity Interview - Second Edition Hack the Cybersecurity Interview - Second Edition
    Add to Cart The item has been added

    Hack the Cybersecurity Interview - Second Edition

    Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with expert adviceKey Features:- Confidently handle technical and soft skill questions across various cybersecurity roles- Prepare for...
    $85.00

    Add to Cart The item has been added
  • Quantum Computing for High School Students Quantum Computing for High School Students
    Add to Cart The item has been added

    Quantum Computing for High School Students

    In 1994 Peter Shor discovered a quantum algorithm which will break most of the cryptography used in Internet communications once large scale quantum computers are built. Quantum computers are devices that operate on the principles of quantum mechanics...
    $52.00

    Add to Cart The item has been added
  • Conversations About Physics Volume 1 Conversations About Physics Volume 1
    Add to Cart The item has been added

    Conversations About Physics Volume 1

    This compendium includes the following 5 complete books featuring renowned physicists Nima Arkani-Hamed, Artur Ekert, Tony Leggett, David Politzer and Paul Steinhardt providing fully accessible insights into cutting-edge academic...
    $66.00

    Add to Cart The item has been added
  • Crafting Secure Software Crafting Secure Software
    Add to Cart The item has been added

    Crafting Secure Software

    Gain a solid understanding of the threat landscape and discover best practices to protect your software factory throughout the SDLC, with valuable insights from security experts at GitGuardianKey Features:- Develop a strong security posture by grasping...
    $131.00

    Add to Cart The item has been added
  • The GPT-4 Crypto Revolution The GPT-4 Crypto Revolution
    Add to Cart The item has been added

    The GPT-4 Crypto Revolution

    Discover the power of AI in the crypto world, from Bitcoin's disruptive emergence to GPT-4's cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your...
    $36.00

    Add to Cart The item has been added
  • Understanding Cryptography Understanding Cryptography
    Add to Cart The item has been added

    Understanding Cryptography

    The study of the techniques that are utilized to ensure secure communication in the presence of adversaries is known as cryptography. It includes the analysis and construction of the protocols to prevent the public or third parties from reading private...
    $254.00

    Add to Cart The item has been added
  • Hack the Cybersecurity Interview Hack the Cybersecurity Interview
    Add to Cart The item has been added

    Hack the Cybersecurity Interview

    Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for...
    $153.00

    Add to Cart The item has been added
  • Exploring Blockchain in Healthcare Exploring Blockchain in Healthcare
    Add to Cart The item has been added

    Exploring Blockchain in Healthcare

    This book aims to analyze the role of blockchain technology in healthcare and how medical tech teams can establish a digital and linked healthcare system for the modern-day. After reading this book, readers will be able to create, develop, and implement...
    $73.00

    Add to Cart The item has been added
  • A Comprehensive Guide to Investing in Cryptocurrency A Comprehensive Guide to Investing in Cryptocurrency
    Add to Cart The item has been added

    A Comprehensive Guide to Investing in Cryptocurrency

    A cryptocurrency is a form of payment that can be exchanged online. Cryptocurrencies work using a technology called a blockchain.It is a collection of binary data which is designed to work as a medium of exchange wherein individual coin ownership records...
    $44.00

    Add to Cart The item has been added
  • The Hidden Corporation The Hidden Corporation
    Add to Cart The item has been added

    The Hidden Corporation

    If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information...
    $41.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Secret Colors

    Secret Colors is a gentle introduction to cryptography. With hand-drawn imagery and gentle explanations of cryptography concepts, this book will captivate beginners of all ages and backgrounds. The annual autumn dance is being held in the forest,...
    $41.00

    Add to Cart The item has been added
  • Convergence Security Convergence Security
    Add to Cart The item has been added

    Convergence Security

    Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and...
    $55.00

    Add to Cart The item has been added
  • Super Secreto - The Third Epoch of Cryptography Super Secreto - The Third Epoch of Cryptography
    Add to Cart The item has been added

    Super Secreto - The Third Epoch of Cryptography

    The global crisis of Privacy in the 21st century also includes discussions about the right to encryption and restrictions on so-called end-to-end encryption. In order to communicate confidentially and secure against eavesdropping, simple and practical...
    $69.00

    Add to Cart The item has been added
Coding theory and cryptology