The Code Book : The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
by Simon Singh Buy this book
|
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
by Bruce Schneier Buy this book
|
|
Understanding the Public-Key Infrastructure (Macmillan Technology Series)
by Carlisle Adams, Steve Lloyd Buy this book
|
|
Java Security
by Scott Oaks Buy this book
|
|
Cryptography and Network Security: Principles and Practice
by William Stallings Buy this book
|
|
Building Linux and Openbsd Firewalls
by Wes Sonnenreich, Tom Yates Buy this book
|
|
Cryptography : Theory and Practice (Discrete Mathematics and Its Applications)
by Douglas R. Stinson Buy this book
|
|
Handbook of Applied Cryptography (CRC Press Series on Discrete Mathematics and Its Applications)
by Alfred J. Menezes, et al Buy this book
|
|
Implementing Elliptic Curve Cryptography
by Michael Rosing Buy this book
|
|
Kerberos: A Network Authentication System
by Brian Tung Buy this book
|
|
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
by Electronic Frontier Foundation, John Gilmore (Editor) Buy this book
|
|
Internet Cryptography
by Richard E. Smith Buy this book
|
|
Java Cryptography
by Jonathan Knudsen Buy this book
|
|
Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
by Randall K. Nichols, et al Buy this book
|
|
Cisco Access Lists Field Guide (McGraw-Hill Technical Expert Series)
by Gilbert Held(Editor), Kent Hundley Buy this book
|
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
by Bruce Schneier Buy this book
|
|
The Official Pgp User's Guide
by Philip R. Zimmermann Buy this book
|
|
Decrypted Secrets : Methods and Maxims of Cryptology
by Friedrich L. Bauer Buy this book
|
|
Elliptic Curves in Cryptography
by G. Seroussi, et al Buy this book
|
|
ICSA Guide to Cryptography
by Randall K. Nichols Buy this book
|
|
Internet Security for Business
by Terry Bernstein(Editor), et al Buy this book
|
|
Pki Essentials : Planning and Implementing Digital Certificate Systems
by Tom Austin, et al Buy this book
|
|
Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics, Vol 3)
by Neal I. Koblitz Buy this book
|
|
Smart Card Security and Applications (Artech House Telecommunications Library)
by Mike Hendry Buy this book
|
|
The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance
by Bruce Schneier, David Banisar Buy this book
|
|