
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms by: Christof Pa...

Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms by: Christof Pa...

Computer Systems Application by: Viktor Borodin (Editor) Publisher: Toronto Academic Press Publication Date: 2024/1/10 L...

Hardware for Quantum Computing by: Chuck Easttom (Author) Publisher: Springer Edition: 2024th Publication Date: 2024/8/2...
SAP Cloud ALM: Application Lifecycle Management (SAP PRESS) by: Matthias Friedrich (Author),Fred Kindler(Author),Marcel ...

Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics by: Adam Tilmar Jakobsen (Author) Publisher: Wiley E...

Pro Spring Boot 3: An Authoritative Guide with Best Practices by: Felipe Gutierrez (Author) Publisher: Apress Edition: T...

Digital Twins for 6G: Fundamental theory, technology and applications (Telecommunications) by: Hamed Ahmadi (Editor),Tru...

Computer Networking by: Zeeshan Qaiser (Author) Publisher: Toronto Academic Press Publication Date: 2024/1/10 Language: ...

Snort 3 QuickStart Pro: Detect malicious network activity, scan packets, generate alerts, and debug traffic for active i...

AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide) by: Anthony Sequeira (Author) Publisher: Pears...