[{"item_id":"4493","item_name":"This Is How They Tell Me the World Ends: A True Story","item_brand":"Nicole Perlroth","item_category":"Computing & Internet","list":"Computer security","price":"1.95","variant":"","quantity":1},{"item_id":"9082","item_name":"Handbook of Applied Cryptography - Discrete Mathematics and Its Applications","item_brand":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone","item_category":"Computing & Internet","list":"Computer security","price":"88.39","variant":"","quantity":1},{"item_id":"9133","item_name":"Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks","item_brand":"Geoff White","item_category":"Computing & Internet","list":"Computer security","price":"5.28","variant":"","quantity":1},{"item_id":"9311","item_name":"Everyday Cryptography: Fundamental Principles and Applications","item_brand":"Keith Martin","item_category":"Computing & Internet","list":"Computer security","price":"40.60","variant":"","quantity":1},{"item_id":"9809","item_name":"Cryptography For Dummies","item_brand":"Chey Cobb","item_category":"Computing & Internet","list":"Computer security","price":"7.06","variant":"","quantity":1},{"item_id":"9973","item_name":"Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto","item_brand":"Roger A. Grimes","item_category":"Computing & Internet","list":"Computer security","price":"13.96","variant":"","quantity":1},{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Computer security","price":"10.12","variant":"","quantity":1},{"item_id":"10959","item_name":"Cryptography InfoSec Pro Guide","item_brand":"Sean-Philip Oriyano","item_category":"Computing & Internet","list":"Computer security","price":"9.29","variant":"","quantity":1},{"item_id":"11289","item_name":"Fundamentals of Smart Contract Security - Computer Engineering Foundations, Currents, and Trajectories Collection","item_brand":"Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, Olga V. Mack","item_category":"Computing & Internet","list":"Computer security","price":"23.90","variant":"","quantity":1},{"item_id":"13018","item_name":"Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings - Security and Cryptology 6061","item_brand":"Nicolas Sendrier","item_category":"Computing & Internet","list":"Computer security","price":"31.49","variant":"","quantity":1},{"item_id":"14598","item_name":"Transatlantic Jurisdictional Conflicts in Data Protection Law: Fundamental Rights, Privacy and Extraterritoriality","item_brand":"Mistale Taylor","item_category":"Business, Finance & Law","list":"Computer security","price":"20.99","variant":"","quantity":1},{"item_id":"16287","item_name":"Bitcoin: Everything You Need to Know About Bitcoin","item_brand":"Corey Bowen","item_category":"Language & Reference","list":"Computer security","price":"14.69","variant":"","quantity":1},{"item_id":"16483","item_name":"Bitcoin Revolution: The Ultimate Bitcoin and Blockchain Guide to Master the World of Cryptocurrency and Take Advantage of the 2021 Bull Run!","item_brand":"Charles Swing, Masaru Nakamoto","item_category":"Language & Reference","list":"Computer security","price":"10.49","variant":"","quantity":1},{"item_id":"16615","item_name":"Cybersecurity Mastery For Beginners: 4 books in 1 Security Threats, Frameworks, Cryptography & Network Security","item_brand":"Hacktech Academy","item_category":"Language & Reference","list":"Computer security","price":"27.26","variant":"","quantity":1},{"item_id":"17964","item_name":"Fundamentals of Cryptography: Introducing Mathematical and Algorithmic Foundations - Undergraduate Topics in Computer Science","item_brand":"Duncan Buell","item_category":"Computing & Internet","list":"Computer security","price":"24.64","variant":"","quantity":1},{"item_id":"17968","item_name":"Progress in Cryptology LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogot, Colombia, October 68, 2021, Proceedings - Lecture Notes in Computer Science 12912","item_brand":"","item_category":"Language & Reference","list":"Computer security","price":"38.85","variant":"","quantity":1},{"item_id":"17979","item_name":"Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 912, 2022, Proceedings - Lecture Notes in Computer Science 13783","item_brand":"Lejla Batina, Stjepan Picek, Mainack Mondal","item_category":"Computing & Internet","list":"Computer security","price":"36.36","variant":"","quantity":1},{"item_id":"18021","item_name":"Privacy Symposium 2024: Data Protection Law International Convergence and Compliance with Innovative Technologies (DPLICIT)","item_brand":"Jaap-Henk Hoepman, Meiko Jensen, Dr Maria Grazia Porcedda, Stefan Schiffner, Sebastien Ziegler","item_category":"Computing & Internet","list":"Computer security","price":"125.99","variant":"","quantity":1},{"item_id":"18024","item_name":"Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaao, March 48, 2024, Revised Selected Papers, Part II - Lecture Notes in Computer Science 14745","item_brand":"Jeremy Clark, Elaine Shi","item_category":"Computing & Internet","list":"Computer security","price":"41.99","variant":"","quantity":1},{"item_id":"18057","item_name":"Selected Areas in Cryptography SAC 2025: 32nd International Conference, Toronto, ON, Canada, August 1315, 2025, Revised Selected Papers - Lecture Notes in Computer Science","item_brand":"Christina Boura, Atefeh Mashatan, Ali Miri","item_category":"Computing & Internet","list":"Computer security","price":"48.99","variant":"","quantity":1}]
Computer security Books
Showing 1 – 18 of 323 results