[{"item_id":"9433","item_name":"An Introduction to Mathematical Cryptography - Undergraduate Texts in Mathematics","item_brand":"Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman","item_category":"Science, Technology & Medicine","list":"Information theory","price":"35.37","variant":"","quantity":1},{"item_id":"16192","item_name":"Psycho-Cybernetics (Updated and Expanded) - Psycho-cybernetics","item_brand":"Gift Card","item_category":"Health & Lifestyle","list":"Information theory","price":"8.39","variant":"","quantity":1},{"item_id":"17963","item_name":"Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 1922, 2020, Proceedings, Part I - Security and Cryptology 12146","item_brand":"Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi","item_category":"Computing & Internet","list":"Information theory","price":"38.85","variant":"","quantity":1},{"item_id":"1748","item_name":"The Black Swan: The Impact of the Highly Improbable","item_brand":"Nassim Nicholas Taleb","item_category":"Language & Reference","list":"Information theory","price":"0.95","variant":"","quantity":1},{"item_id":"2924","item_name":"Nexus: A Brief History of Information Networks from the Stone Age to AI","item_brand":"Yuval Noah Harari","item_category":"History","list":"Information theory","price":"7.69","variant":"","quantity":1},{"item_id":"7139","item_name":"The Unaccountability Machine: Why Big Systems Make Terrible Decisions","item_brand":"Dan Davies","item_category":"Language & Reference","list":"Information theory","price":"6.08","variant":"","quantity":1},{"item_id":"8470","item_name":"Understanding Cryptography: A Textbook for Students and Practitioners","item_brand":"Christof Paar, Bart Preneel, Jan Pelzl","item_category":"Computing & Internet","list":"Information theory","price":"22.96","variant":"","quantity":1},{"item_id":"11037","item_name":"Introduction to Cryptography: Principles and Applications - Information Security and Cryptography","item_brand":"Hans Delfs, Helmut Knebl","item_category":"Computing & Internet","list":"Information theory","price":"31.49","variant":"","quantity":1},{"item_id":"11038","item_name":"Information Theory, Coding & Cryptography","item_brand":"Arijit Saha, NilotPal Manna, Surajit Mandal","item_category":"Language & Reference","list":"Information theory","price":"3.50","variant":"","quantity":1},{"item_id":"11294","item_name":"History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms - History of Computing","item_brand":"John F. Dooley","item_category":"Computing & Internet","list":"Information theory","price":"36.36","variant":"","quantity":1},{"item_id":"12100","item_name":"Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich - Information Security and Cryptography","item_brand":"Yehuda Lindell","item_category":"Computing & Internet","list":"Information theory","price":"38.49","variant":"","quantity":1},{"item_id":"12228","item_name":"Algebraic Curves in Cryptography - Discrete Mathematics and Its Applications","item_brand":"San Ling, Huaxiong Wang, Chaoping Xing","item_category":"Language & Reference","list":"Information theory","price":"43.39","variant":"","quantity":1},{"item_id":"12262","item_name":"Algebraic Curves in Cryptography - Discrete Mathematics and Its Applications","item_brand":"San Ling, Huaxiong Wang, Chaoping Xing","item_category":"Language & Reference","list":"Information theory","price":"77.00","variant":"","quantity":1},{"item_id":"12746","item_name":"Bloomsbury Professional Law Insight - Cryptocurrency in Matrimonial Finance - Bloomsbury Professional Law Insights","item_brand":"Dean Armstrong KC, Marc Samuels","item_category":"Business, Finance & Law","list":"Information theory","price":"42.00","variant":"","quantity":1},{"item_id":"12996","item_name":"Cryptography for Secure Encryption - Universitext","item_brand":"Robert G. Underwood","item_category":"Science, Technology & Medicine","list":"Information theory","price":"8.40","variant":"","quantity":1},{"item_id":"13913","item_name":"Quantum Communication and Cryptography","item_brand":"Walter O. Krawec","item_category":"Language & Reference","list":"Information theory","price":"64.36","variant":"","quantity":1},{"item_id":"15223","item_name":"A Classical Introduction to Cryptography: Applications for Communications Security","item_brand":"Serge Vaudenay","item_category":"Language & Reference","list":"Information theory","price":"48.99","variant":"","quantity":1},{"item_id":"17959","item_name":"Cryptography Arithmetic: Algorithms and Hardware Architectures - Advances in Information Security 77","item_brand":"Amos R. Omondi","item_category":"Computing & Internet","list":"Information theory","price":"83.99","variant":"","quantity":1},{"item_id":"17961","item_name":"Blockchain and Distributed Ledger Technology Use Cases: Applications and Lessons Learned - Progress in IS","item_brand":"Horst Treiblmaier, Trevor Clohessy","item_category":"Business, Finance & Law","list":"Information theory","price":"113.92","variant":"","quantity":1},{"item_id":"18087","item_name":"Secure Data Deletion - Information Security and Cryptography","item_brand":"Joel Reardon","item_category":"Computing & Internet","list":"Information theory","price":"76.99","variant":"","quantity":1}]
Information theory Books
Showing 1 – 18 of 32 results