نتایج جستجو
Full Stack Python Security: Cryptography, TLS, and attack resistance
Dennis Byrne, 2021
Cryptography and Network Security: Principles and Practice, 8/e
William Stallings, 2019
Cryptography and Cryptanalysis in MATLAB: Creating and Programming Advanced Algorithms
Marius Iulian Mihailescu, Stefania Loredana Nita, 2021
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition
Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan, 2021
solution manual cryptography and network security
William Stallings, 2006
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Marius Iulian Mihailescu, 2021
Real-World Cryptography
David Wong, 2021
Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson, 2017
Error-Correcting Codes, Finite Geometries and Cryptography
Aiden A. Bruen, David L. Wehlau, Aiden A. Bruen, David L. Wehlau (ed.), 2010
The Currency Cold War: Cash and Cryptography, Hash Rates and Hegemony
David Birch, 2020
Cryptography and Network Security: Principles and Practice
William Stallings, 2019
Cryptography Algorithms
Massimo Bertaccini, 2022
Manga Guide UNIVERSE Relativity physics electricity cryptography regression analysis maths calculus microprocessors computing etc physics biochemistry statistics physiology
kazuhiro fujitaki, matsuda , No Starch Press, 2022
Everyday Cryptography: Fundamental Principles and Applications
Keith Martin, 2017
An Introduction to Mathematical Cryptography Solution Manual (Undergraduate Texts in Mathematics)
Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, 2014
Cryptography and Cryptanalysis in Java - Creating and Programming Advanced Algorithms with Java SE 17 LTS and Jakarta EE 10
Stefania Loredana Nita, Marius Iulian Mihailescu, 2022
Cryptography and Network Security: Principles and Practice, Global Edition
William Stallings, 2022
Practical Mathematical Cryptography
Kristian Gjøsteen, 2022
An Introduction to Cryptography, Second Edition
RICHARD A. MOLLIN, 2006
Holistic Approach to Quantum Cryptography in Cyber Security
Shashi Bhushan; Manoj Kumar; Pramod Kumar; Renjith V Ravi; Anuj Kumar Singh, 2022
Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications
Feng Liu; Wei Qi Yan, 2015
