کتاب های Bruce Kent

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier, 1995
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier, 1995
Beyond Fear
Bruce Schneier, 2003
Bruce Schneier on Trust Set
Bruce Schneier, 2014
Bruce Schneier on Trust Set
Bruce Schneier, 2014
Bruce Schneier on Trust Set
Bruce Schneier, 2014
Carry On: Sound Advice from Schneier on Security
Bruce Schneier, 2013
Cryptographie appliquee French
Bruce Schneier
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier, 2015
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier, 2015
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier, 2012
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier, 2012
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier, 2012
Schneier on Security
Bruce Schneier, 2008
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier, 2004
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier, 2004
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
Bruce Schneier, 1999
Convincing Ground: Learning to Fall in Love With Your Country
Bruce Pascoe, 2007
Coping and Health
J. Bruce Overmier, 1980
School District Leadership Matters
Dr. Bruce Sheppard, 2009
The Exstrophy—Epispadias Complex: Research Concepts and Clinical Applications
Bruce Slaughenhoupt (auth.), 1999
A Slaving Voyage to Africa and Jamaica: The Log of the Sandown, 1793-1794
Bruce L. Mouser, 2002