Криптографія

Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity

Mayukh Mukhopadhyay

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

EU General Data Protection Regulation (GDPR). An implementation and compliance guide

IT Governance Publishing, IT Governance Privacy Team

Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications

Koshik Raj

Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition

David Álvarez Pérez, Ravikant Tiwari

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python

Harish Garg

Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python

Arjuna Sky Kok

Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer

Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr Novotny, ...

Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data

Samuel Bowne

Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions

Maximiliano Santos, Enio Moura

Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#

Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Information Security Risk Management for ISO 27001/ISO 27002. A Practical Guide to Risk, Assessment, and Control Selection Aligned with ISO Standards

IT Governance Publishing, Alan Calder, Steve G Watkins

ISO 27001/ISO 27002. A guide to information security management systems

IT Governance Publishing, Alan Calder