The Fellowship of the Ring
J. R. R. Tolkien
The Lord of the Rings (2)
Cable Networks, Services, and Management
Mehmet Toy
Professional Java for Web Applications
Nicholas S. Williams
Enterprise IPv6 for Enterprise Networks
Ghazi Mokammel Hossain
Computational Number Theory and Modern Cryptography
Song Y. Yan
Cryptography in C and C++
Michael Welschenbach
Cryptography and Network Security: Principles and Practice (6th ...
William Stallings
Cryptography and Network Security: Principles and Practice (4th ...
OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL ...
Ivan Ristic
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims
What Is Computer Science?: An Information Security Perspective
Daniel Page & Nigel Smart
Hackers :: Heroes of the Computer Revolution. (Reloaded)
Steven Levy
Crypto101
Laurens Van Houtven
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner