[{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Network security","price":"10.12","variant":"","quantity":1},{"item_id":"12020","item_name":"Efficient Ways to Use the Internet Securely: Protect Your Digital Assets, Privacy and Online Transactions - Digital Concerns 2","item_brand":"Mark Millery","item_category":"Computing & Internet","list":"Network security","price":"13.30","variant":"","quantity":1},{"item_id":"18057","item_name":"Selected Areas in Cryptography SAC 2025: 32nd International Conference, Toronto, ON, Canada, August 1315, 2025, Revised Selected Papers - Lecture Notes in Computer Science","item_brand":"Christina Boura, Atefeh Mashatan, Ali Miri","item_category":"Computing & Internet","list":"Network security","price":"48.99","variant":"","quantity":1},{"item_id":"18516","item_name":"Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 1012, 2022, Revised Selected Papers - Communications in Computer and Information Science 1680","item_brand":"Chunhua Su, Kouichi Sakurai","item_category":"Computing & Internet","list":"Network security","price":"45.49","variant":"","quantity":1},{"item_id":"9954","item_name":"Implementing SSL \/ TLS Using Cryptography and PKI","item_brand":"Joshua Davies","item_category":"Computing & Internet","list":"Network security","price":"35.00","variant":"","quantity":1},{"item_id":"11476","item_name":"Introduction to Network Security - Chapman & Hall\/CRC Cryptography and Network Security Series","item_brand":"Douglas Jacobson","item_category":"Computing & Internet","list":"Network security","price":"20.04","variant":"","quantity":1},{"item_id":"12648","item_name":"Public Key Cryptography: Applications and Attacks - IEEE Press Series on Information and Communication Networks Security","item_brand":"Lynn Margaret Batten","item_category":"Computing & Internet","list":"Network security","price":"44.79","variant":"","quantity":1},{"item_id":"12997","item_name":"Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications - Information Security and Cryptography","item_brand":"","item_category":"Language & Reference","list":"Network security","price":"51.37","variant":"","quantity":1},{"item_id":"14365","item_name":"Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography","item_brand":"Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam","item_category":"Computing & Internet","list":"Network security","price":"30.50","variant":"","quantity":1},{"item_id":"16279","item_name":"Blockchain Startup: Master the Cryptocurrency Bitcoin and Ethereum, Find Out Why they are the New Frontier of Trading","item_brand":"Mark Azis","item_category":"Business, Finance & Law","list":"Network security","price":"13.99","variant":"","quantity":1},{"item_id":"17967","item_name":"Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 810, 2021, Proceedings - Security and Cryptology 12835","item_brand":"Toru Nakanishi, Ryo Nojima","item_category":"Computing & Internet","list":"Network security","price":"38.85","variant":"","quantity":1},{"item_id":"17972","item_name":"Enhancing Information Security and Privacy by Combining Biometrics with Cryptography - Synthesis Lectures on Information Security, Privacy, and Trust","item_brand":"Sanjay Kanade, Dijana Petrovska-Delacretaz, Bernadette Dorizzi","item_category":"Computing & Internet","list":"Network security","price":"16.90","variant":"","quantity":1},{"item_id":"17973","item_name":"Information Security and Cryptology ICISC 2021: 24th International Conference, Seoul, South Korea, December 13, 2021, Revised Selected Papers - Lecture Notes in Computer Science 13218","item_brand":"Jong Hwan Park, Seung-Hyun Seo","item_category":"Computing & Internet","list":"Network security","price":"52.49","variant":"","quantity":1},{"item_id":"17983","item_name":"Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 2630, 2022, Revised Selected Papers - Lecture Notes in Computer Science 13619","item_brand":"Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nicola Dragoni","item_category":"Computing & Internet","list":"Network security","price":"36.36","variant":"","quantity":1},{"item_id":"18524","item_name":"2025 International Conference on Blockchain and Web3.0 Technology Innovation and Application Exchange: Second Conference, BWTAC 2025, Chengdu, China, November 79, 2025, Proceedings - Communications in Computer and Information Science","item_brand":"Xiao Song Zhang, Sheng Cao","item_category":"Computing & Internet","list":"Network security","price":"55.99","variant":"","quantity":1},{"item_id":"18527","item_name":"Cryptology and Network Security: 24th International Conference, CANS 2025, Osaka, Japan, November 1720, 2025, Proceedings - Lecture Notes in Computer Science","item_brand":"Yongdae Kim, Atsuko Miyaji, Mehdi Tibouchi","item_category":"Computing & Internet","list":"Network security","price":"48.99","variant":"","quantity":1},{"item_id":"19162","item_name":"Cryptography and Cybersecurity in the Department of Defence: A Practical Guide to Encryption and National Security","item_brand":"Paris Wolf","item_category":"Computing & Internet","list":"Network security","price":"27.99","variant":"","quantity":1}]
Network security Books
Showing 1 – 17 of 17 results