BOOKS - NETWORK TECHNOLOGIES - Cryptography and Network Security Principles and Pract...
Cryptography and Network Security Principles and Practice, Sixth Edition - William Stallings 2014 PDF Pearson Education BOOKS NETWORK TECHNOLOGIES
ECO~23 kg CO²

2 TON

Views
5774

Telegram
 
Cryptography and Network Security Principles and Practice, Sixth Edition
Author: William Stallings
Year: 2014
Pages: 758
Format: PDF
File size: 12.62 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Criminality, Public Security, and the Challenge to Democracy in Latin America (Kellogg Institute Series on Democracy and Development)
Big Data Management Data Governance Principles for Big Data Analytics, 1st Edition
Ultimate Step by Step Guide to Deep Learning Using Python Artificial Intelligence and Neural Network Concepts Explained in Simple Terms (Ultimate Step by Step Guide to Machine Learning Book 2)
Mastering Cloud Storage Navigating cloud solutions, data security, and cost optimization for seamless digital transformation
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs Exam SY0-501
Atomic Assistance: How and quot;Atoms for Peace and quot; Programs Cause Nuclear Insecurity (Cornell Studies in Security Affairs)
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (Final Release)
Terrorism in Pakistan: The Tehreek-e-Taliban Pakistan (TTP) and the Challenge to Security (International Library of Twentieth Century History)
Mastering Cloud Storage Navigating cloud solutions, data security, and cost optimization for seamless digital transformation
Open-Source Security Operations Center (SOC) A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (Final Release)
Back Channel Negotiation: Security in Middle East Peace Process (Syracuse Studies on Peace and Conflict Resolution)
Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats
Danger Trail: Trail of Evidence Security Breach
SAP System Security Guide (SAP PRESS)
Wireshark for Security Professionals Using Wireshark and the Metasploit Framework
Software Security Building secure software applications
Deadly Rescue (Agile Security and Rescue Book 2)
Freedom from Fear, Freedom from Want: An Introduction to Human Security
Data Analytics Principles, Tools, and Practices A Complete Guide for Advanced Data Analytics Using the Latest Trends, Tools
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (4th Early Release)
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (4th Early Release)
Social Security 101: From Medicare to Spousal Benefits, an Essential Primer on Government Retirement Aid (Adams 101 Series)
Social Security Programs and Retirement around the World: Reforms and Retirement Incentives (National Bureau of Economic Research Conference Report)
Spring Security - Fourth Edition: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, 2nd Edition (Early Release)
Tactical Home Defense and Security: Defend Yourself and Family Against Home Invasion and Deadly Attack (Special Tactics Manuals Book 8)
Fashion Design Essentials 100 Principles of Fashion Design
Computer Science Principles: The Foundational Concepts of Computer Science
Escort Detail Mobile VIP Protection: Mobile Security and Motorcade Operations for 3-4 Person Details (Special Tactics Manuals Book 4)
Trade Policy and Food Security: Improving Access to Food in Developing Countries in the Wake of High World Prices (Directions in Development)
Overseas Energy Investment of Korea and Japan: How did Two East Asian Resources-Rare Industrial Giants Respond to Energy Security Challenges
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks An Ultimate Guide To Secure Your Cloud And On-Premise Networks
Water, Environmental Security and Sustainable Rural Development: Conflict and Cooperation in Central Eurasia (Routledge ISS Studies in Rural Livelihoods)
Education Leadership, Management and Governance in South Africa (African Political, Economic, and Security Issues: Education in a Competitive and Globalizing World)
and quot;Rich Nation, Strong Army and quot;: National Security and the Technological Transformation of Japan (Cornell Studies in Political Economy)
Daddy|s Bodyguard: An Age-Gap Protector Ex-Military Romance: Protective Alpha Hero, Forced Proximity, Security Protection (Forbidden and Off-Limit Women Book 3)
Mastering Spring Reactive Programming for High Performance Web Apps Revolutionize Your Asynchronous Application Development in Spring with Reactive Programming Principles, Spring WebFlux and Reactor
Mastering Spring Reactive Programming for High Performance Web Apps Revolutionize Your Asynchronous Application Development in Spring with Reactive Programming Principles, Spring WebFlux and Reactor