The Code Book : The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
by Simon Singh Buy this book
|
 |
Digital Certificates: Applied Internet Security
by Jalal Feghhi, et al Buy this book
|
 |
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
by Warwick Ford, Michael S. Baum Buy this book
|
 |
Cryptography and Network Security: Principles and Practice
by William Stallings Buy this book
|
 |
Implementing Elliptic Curve Cryptography
by Michael Rosing Buy this book
|
|
Electronic Payment Systems (Artech House Computer Science Library)
by Donal O'Mahony, et al Buy this book
|
 |
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
by Electronic Frontier Foundation, John Gilmore (Editor) Buy this book
|
 |
Internet Cryptography
by Richard E. Smith Buy this book
|
 |
Understanding Digital Signatures: Establishing Trust Over the Internet and Other Networks (CommerceNet)
by Gail L. Grant Buy this book
|
 |
Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
by Randall K. Nichols, et al Buy this book
|
 |
PGP : Pretty Good Privacy
by Simson Garfinkel Buy this book
|
 |
Building SET Applications for Secure Transactions
by Mark S. Merkow, et al Buy this book
|
 |
Basic Methods of Cryptography
by Jan C.A. Van Der Lubbe Buy this book
|
 |
Privacy on the Line: The Politics of Wiretapping and Encryption
by Whitfield Diffie, Susan Landau Buy this book
|
 |
The Twofish Encryption Algorithm : A 128-Bit Block Cipher
by Bruce Schneier, et al Buy this book
|
 |
ICSA Guide to Cryptography
by Randall K. Nichols Buy this book
|
 |
Digital Cash : Commerce on the Net
by Peter Wayner Buy this book
|
 |
Learn Encryption Techniques with BASIC and C++
by Gilbert Held, Gil Held Buy this book
|
 |
The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance
by Bruce Schneier, David Banisar Buy this book
|
 |
Digital Money : The New Era of Internet Commerce
by Daniel C. Lynch, Leslie Heeter Lundquist Buy this book
|
 |
Privacy on the Line: The Politics of Wiretapping and Encryption
by Whitfield Diffie, Susan Eva Landau Buy this book
|
 |
Personal Encryption Clearly Explained
by Peter Loshin Buy this book
|
 |
The Global Internet Trust Register 1999 Edition
by Ross J. Anderson(Editor), et al Buy this book
|
 |
Rethinking Public Key Infrastructures and Digital Certificates : Building in Privacy
by Stefan A. Brands Buy this book
|
 |
The Limits of Trust : Cryptography, Governments, and Electronic Commerce
by Stewart Abercrombie Baker, Paul R. Hurst Buy this book
|
 |