Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Modern Cryptography: The Practical Guide to Securing Data (Rheinwerk Computing)

    Posted By: Free butterfly
    Modern Cryptography: The Practical Guide to Securing Data (Rheinwerk Computing)

    Modern Cryptography: The Practical Guide to Securing Data (Rheinwerk Computing) by Sandip Dholakia
    English | September 26, 2024 | ISBN: 1493225650 | 325 pages | MOBI | 48 Mb

    Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics

    Posted By: yoyoloit
    Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics

    Securing the Digital Frontier
    by Kavita Sharma, Vishnu Sharma, Parma Nand, Anil Kumar Sagar, Gulshan Shrivastava

    English | 2025 | ISBN: 1394268882 | 417 pages | True PDF EPUB | 36.91 MB

    Everyday Cryptography: Fundamental Principles and Applications Ed 2

    Posted By: roxul
    Everyday Cryptography: Fundamental Principles and Applications Ed 2

    Keith Martin, "Everyday Cryptography: Fundamental Principles and Applications Ed 2"
    English | ISBN: 0198788010 | 2017 | 720 pages | AZW3 | 5 MB

    "Cybersecurity in the Industry 5.0 Era" ed. by Christos Kalloniatis

    Posted By: exLib
    "Cybersecurity in the Industry 5.0 Era" ed. by Christos Kalloniatis

    "Cybersecurity in the Industry 5.0 Era" ed. by Christos Kalloniatis
    ITexLi | 2025 | ISBN: 0850144841 9780850144840 0850144833 9780850144833 085014485X 9780850144857 | 260 pages | PDF | 24 MB

    This book delves into the evolving role of cybersecurity, offering insights to help stakeholders navigate this dynamic landscape. Whether you are a technologist, policymaker, academic, or business leader, this book offers valuable perspectives to help you identify the potential cybersecurity challenges that will be raised in the Industry 5.0 era.

    Cryptography and the World Wars

    Posted By: TiranaDok
    Cryptography and the World Wars

    Cryptography and the World Wars: The History of Codemaking and Codebreaking during Both Global Conflicts by Charles River Editors
    English | December 5, 2024 | ISBN: N/A | ASIN: B0DPRBMMT7 | 111 pages | EPUB | 4.52 Mb

    Digital Defense: The Essential Guide for Cyber Security

    Posted By: TiranaDok
    Digital Defense: The Essential Guide for Cyber Security

    Digital Defense: The Essential Guide for Cyber Security by Selim VARIŞLI
    English | October 23, 2023 | ISBN: N/A | ASIN: B0CLN832TG | 308 pages | EPUB | 0.69 Mb

    Differential Cryptanalysis of the Data Encryption Standard

    Posted By: AvaxGenius
    Differential Cryptanalysis of the Data Encryption Standard

    Differential Cryptanalysis of the Data Encryption Standard by Eli Biham , Adi Shamir
    English | PDF | 1993 | 192 Pages | ISBN : 1461393167 | 16.3 MB

    DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970`s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the field`s leading researchers, and describes state-of-the-art research in a clear and completely contained manner.

    What You Don’t Know Could Hack You: The Case for End-to-End Encryption

    Posted By: eBookRat
    What You Don’t Know Could Hack You: The Case for End-to-End Encryption

    What You Don’t Know Could Hack You: The Case for End-to-End Encryption
    by Alex Carter

    English | December 16, 2024 | ASIN: B0DQPLPJR2 | 24 pages | PDF | 12 Mb

    Ibm Datapower Development - Basics

    Posted By: Sigha
    Ibm Datapower Development - Basics

    Ibm Datapower Development - Basics
    Last updated 5/2024
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English (US) | Size: 1.11 GB | Duration: 3h 30m

    Docker, XML Firewall, Multi protocol Gateway, Encryption & Decryption, Sign & Verify, AAA, logging, Error handling

    Serious Cryptography, 2nd Edition

    Posted By: hill0
    Serious Cryptography, 2nd Edition

    Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
    English | 2025 | ISBN: 1718503849 | 376 Pages | EPUB | 15 MB

    Cryptography Algorithms

    Posted By: eBookRat
    Cryptography Algorithms

    Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography
    by Massimo Bertaccini

    English | August 12, 2024 | ISBN: 1835087973 | 568 pages | EPUB | 17 Mb

    Email Security Secrets : Sure Way to Protect Your Inbox

    Posted By: TiranaDok
    Email Security Secrets : Sure Way to Protect Your Inbox

    Email Security Secrets : Sure Way to Protect Your Inbox by Roger Williams
    English | March 26, 2024 | ISBN: N/A | ASIN: B0CW1K9PC7 | 152 pages | EPUB | 0.15 Mb

    Secure Software Design: Advanced Strategies for Building Resilient and Secure Applications

    Posted By: TiranaDok
    Secure Software Design: Advanced Strategies for Building Resilient and Secure Applications

    Secure Software Design: Advanced Strategies for Building Resilient and Secure Applications by Saimon Carrie
    English | May 23, 2024 | ISBN: N/A | ASIN: B0D53K3FKL | 101 pages | EPUB | 1.37 Mb

    Lim Guan Leng - Understanding Data Encryption

    Posted By: Bibliotkaaa
    Lim Guan Leng - Understanding Data Encryption

    Lim Guan Leng - Understanding Data Encryption: A Practical Guide To Secure Computing
    2024 | ASIN: B0D1SFL82B | English | 83 pages | PDF, EPUB, AZW3, MOBI | 6.23 MB

    Bypassing Memory Encryption

    Posted By: eBookRat
    Bypassing Memory Encryption

    Bypassing Memory Encryption: A Simpler, Non-Technical General Reading for Knowledge Hackers (Ethical Hacking and Penetration Testing)
    by Rickbed Nandi, Tapasi Mandal Nandi

    English | March 14, 2024 | ASIN: B0CY5LC1F1 | 165 pages | PNG (.rar) | 40 Mb