Security & Cryptography Books - Free eBooks Directory
Free Security & Cryptography ebooks. Categorized directory of free Security & Cryptography books. Read online or download free eBooks in different formats.
Free eBooks
48
Ebook Details
Author
Tarek N. Saadawi, Louis H. Jordan Jr.
Publisher
Strategic Studies Institute 2011
Free eBooks
62
Ebook Details
Publisher
Wikibooks 2010
This Wikibook is an introduction to information security aimed primarily at K-12 administrators, educators, and (to a lesser extent) technology staff.
Free eBooks
55
Ebook Details
Author
Petter Gottschalk
Publisher
BookBoon 2010
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
Free eBooks
57
Ebook Details
Author
Al Sweigart
Publisher
2013
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
Free eBooks
51
Ebook Details
Author
Jaydip Sen (ed.)
Publisher
InTech 2012
Free eBooks
48
Ebook Details
Author
N. Richard Wagner
Publisher
Univ. of Texas San Antonio 2002
Free eBooks
70
Ebook Details
Author
Neal R. Wagner
Publisher
Univ. of Texas San Antonio 2003
Free eBooks
48
Ebook Details
Author
WeiQi Yan, Jonathan Weir
Publisher
BookBoon 2010
This introductory text covers media security, starting off by highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
Free eBooks
46
Ebook Details
Author
J.H. Saltzer, M.D. Schroeder
Publisher
MIT 1975
Free eBooks
62
Ebook Details
Author
Tom Szuba
Publisher
NCES 1998
This guide has been developed specifically for educational administrators at the building, campus, district, system, and state levels. It is meant to serve as a framework to help them better understand why, and how, to effectively secure their organization's information, software, and computer and networking equipment. ...