Open navigation menuScribd Logo
enChange Language

Language

  • English(selected)
  • Español
  • Português
  • Deutsch
  • Français
  • Русский
  • Italiano
  • Română
  • Bahasa Indonesia
Learn more
Upload
User Settings

Welcome to Scribd!

  • Upload
  • Language (EN)
  • Scribd Perks
  • Read for free
  • FAQ and support
Skip carousel
  • What is Scribd?
  • Ebooks
  • Audiobooks
  • Magazines
  • Podcasts
  • Sheet music
  • Documents
  • Snapshots
  • Explore Ebooks

    Categories

    • Bestsellers
    • Editors' Picks
    • All Ebooks
    • Contemporary Fiction
    • Literary Fiction
    • Religion & Spirituality
    • Self-Improvement
      • Personal Growth
    • Home & Garden
      • Gardening
    • Mystery, Thriller & Crime Fiction
      • Suspense
    • True Crime
    • Science Fiction & Fantasy
    • Young Adult
      • Dystopian
      • Paranormal, Occult & Supernatural
      • Romance
    • Historical Fiction
    • Science & Mathematics
    • History
    • Study Aids & Test Prep
    • Business
      • Small Business & Entrepreneurs
    All categories
  • Explore Audiobooks

    Categories

    • Bestsellers
    • Editors' Picks
    • All audiobooks
    • Mystery, Thriller & Crime Fiction
      • Mystery
      • Thrillers
    • Romance
      • Contemporary
      • Suspense
    • Young Adult
      • Paranormal, Occult & Supernatural
      • Mysteries & Thrillers
    • Science Fiction & Fantasy
      • Science Fiction
      • Dystopian
    • Career & Growth
      • Careers
      • Leadership
    • Biography & Memoir
      • Adventurers & Explorers
      • Historical
    • Religion & Spirituality
      • Inspirational
      • New Age & Spirituality
    All categories
  • Explore Magazines

    Categories

    • Editors' Picks
    • All magazines
    • News
      • Business News
      • Entertainment News
      • Politics
      • Tech News
    • Finance & Money Management
      • Personal Finance
    • Career & Growth
      • Leadership
    • Business
      • Strategic Planning
    • Sports & Recreation
    • Pets
    • Games & Activities
      • Video Games
    • Wellness
      • Exercise & Fitness
    • Cooking, Food & Wine
    • Art
    • Home & Garden
      • Crafts & Hobbies
    All categories
  • Explore Podcasts

    • All podcasts

    Categories

    • Religion & Spirituality
    • News
    • Entertainment News
    • Mystery, Thriller & Crime Fiction
    • True Crime
    • History
    • Politics
    • Social Science
    All categories
  • Genre

    • Classical
    • Country
    • Folk
    • Jazz & Blues
    • Movies & Musicals
    • Pop & Rock
    • Religious & Holiday
    • Standards

    Instrument

    • Brass
    • Drums & Percussion
    • Guitar, Bass, and Fretted
    • Piano
    • Strings
    • Vocal
    • Woodwinds

    Difficulty

    • Beginner
    • Intermediate
    • Advanced
  • Explore Documents

    Categories

    • Academic Papers
    • Business Templates
    • Court Filings
    • All documents
    • Sports & Recreation
      • Bodybuilding & Weight Training
      • Boxing
      • Martial Arts
    • Religion & Spirituality
      • Christianity
      • Judaism
      • New Age & Spirituality
      • Buddhism
      • Islam
    • Art
      • Music
      • Performing Arts
    • Wellness
      • Body, Mind, & Spirit
      • Weight Loss
    • Self-Improvement
    • Technology & Engineering
    • Politics
      • Political Science
    All categories
  1. Browse

Cryptography

Everything

Bestselling in Cryptography

View More
Skip carousel
carousel previouscarousel next
  • Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies

    Author Craig P. Bauer
  • The Secrets of Station X: How the Bletchley Park codebreakers helped win the war

    Author Michael Smith
  • Blockchain Basics: A Non-Technical Introduction in 25 Steps

    Author Daniel Drescher
  • Network Security & Cryptography MCQ'S

    Author GuruKPO
  • The Third Reich is Listening: Inside German codebreaking 1939–45

    Author Christian Jennings
  • The Emperor's Codes: Bletchley Park's role in breaking Japan's secret cyphers

    Author Michael Smith
  • Cryptanalysis: A Study of Ciphers and Their Solution

    Author Helen F. Gaines
  • The Secret Code of Success: 7 Hidden Steps to More Wealth and Happiness

    Author Noah St. John
  • Enigma: The Battle for the Code

    Author Hugh Sebag-Montefiore
  • Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

    Author Andy Greenberg
  • cMix: Anonymization by High-Performance Scalable Mixing

    Author Andy Greenberg
  • Schneier on Security

    Author Bruce Schneier
  • X, Y and Z: The Real Story of How Enigma Was Broken

    Author Dermot Turing
  • Codes, Ciphers and Secret Writing

    Author Martin Gardner
  • The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

    Author Joshua Holden
  • Perfect Password: Selection, Protection, Authentication

    Author Mark Burnett
  • Dilly: The Man Who Broke Enigmas

    Author Mavis Batey
  • OpenVPN Building and Integrating Virtual Private Networks

    Author Markus Feilner
  • SIGINT: The Secret History of Signals Intelligence in the World Wars

    Author Peter F. Matthews
  • Cryptography for Developers

    Author Tom St Denis
  • Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security

    Author Praphul Chandra
  • Surreptitiously Weakening Cryptographic Systems

    Author Andy Greenberg
  • InfoSecurity 2008 Threat Analysis

    Author Craig Schiller
  • Practical Embedded Security: Building Secure Resource-Constrained Systems

    Author Timothy Stapko
  • Code Cracking for Kids: Secret Communications Throughout History, with 21 Codes and Ciphers

    Author Jean Daigneau
  • Codes and Ciphers - A History of Cryptography

    Author Alexander D'Agapeyeff
  • Hackproofing Your Wireless Network

    Author Syngress
  • Developer's Guide to Web Application Security

    Author Michael Cross
  • Web Application Vulnerabilities: Detect, Exploit, Prevent

    Author Steven Palmer
  • Cybersecurity For Dummies

    Author Joseph Steinberg

Everything About Cryptography

View More
Skip carousel
carousel previouscarousel next
  • Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test

    Author Peter Bradley
  • Cracking Codes and Cryptograms For Dummies

    Author Denise Sutherland
  • OpenVPN Building and Integrating Virtual Private Networks

    Author Markus Feilner
  • The Secret Code of Success: 7 Hidden Steps to More Wealth and Happiness

    Author Noah St. John
  • Penetration Testing Bootcamp

    Author Jason Beltrame
  • Cryptography for Developers

    Author Tom St Denis
  • Hacking: 25 Incredibly Useful Beginners Hacking Tips on How to Hack

    Author Steve Brown
  • Street Cryptography

    Author Christopher Forrest
  • Codes and Ciphers - A History of Cryptography

    Author Alexander D'Agapeyeff
  • Cryptography: The Key to Digital Security, How It Works, and Why It Matters

    Author Keith Martin
  • Application security in the ISO27001:2013 Environment

    Author Vinod Vasudevan
  • Wireless Hacking 101

    Author Karina Astudillo
  • Cybersecurity For Dummies

    Author Joseph Steinberg
  • The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet

    Author David Kahn
  • Hacking the Hacker: Learn From the Experts Who Take Down Hackers

    Author Roger A. Grimes
  • Codes and Ciphers

    Author HarperCollins UK
  • Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing

    Author Peter Bradley
  • Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

    Author Slava Gomzin
  • CISA Exam-Testing Concept-Elements of PKI i.e CA/RA/CRL/CPS (Domain-5)

    Author Hemang Doshi
  • Easy Password Creation Systems For Life (Introduction)

    Author Josephine Rosenburgh
  • Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development

    Author David Kleidermacher
  • X, Y and Z: The Real Story of How Enigma Was Broken

    Author Dermot Turing
  • iOS Forensics Cookbook

    Author Birani Bhanu
  • The American Black Chamber

    Author Herbert O. Yardley
  • Codes: How to Make Them and Break Them!

    Author Kjartan Poskitt
  • Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks

    Author Trust Genics
  • Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)

    Author Peter Bradley
  • The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

    Author Joshua Holden
  • Dilly: The Man Who Broke Enigmas

    Author Mavis Batey
  • Kali Linux Wireless Penetration Testing: Beginner's Guide

    Author Vivek Ramachandran

Recently Added

View More
Skip carousel
carousel previouscarousel next
  • Hacking the Hacker: Learn From the Experts Who Take Down Hackers

    Author Roger A. Grimes
  • Codebreaking Sisters: Our Secret War

    Author Jean Owtram
  • Schneier on Security

    Author Bruce Schneier
  • Secret and Urgent - The Story of Codes and Ciphers

    Author Anon
  • Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura

    Author Linda A. Bertram
  • Penetration Testing

    Author Robert Karamagi
  • The Secret Lives of Codebreakers: The Men and Women Who Cracked the Enigma Code at Bletchley Park

    Author Sinclair McKay
  • Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)

    Author Peter Bradley
  • Cryptography: The Key to Digital Security, How It Works, and Why It Matters

    Author Keith Martin
  • Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging

    Author Mancy A. Wake
  • Code Cracking for Kids: Secret Communications Throughout History, with 21 Codes and Ciphers

    Author Jean Daigneau
  • Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks

    Author Trust Genics
  • Unravelling Enigma: Winning the Code War at Station X

    Author Maurice Freedman
  • Introduction to Blockchain Technology

    Author Introbooks Team
  • Code Wars: How 'Ultra' and 'Magic' Led to Allied Victory

    Author John Jackson
  • The Spy in Hitler's Inner Circle: Hans-Thilo Schmidt and the Allied Intelligence Network that Decoded Germany's Enigma

    Author Paul Paillole
  • Cybersecurity For Dummies

    Author Joseph Steinberg
  • How to Keep Your Stuff Safe Online

    Author Raef Meeuwisse
  • Bill Tutte Codebreaker: and His Battle with Hitler’s Secret Cipher

    Author Tom Williams
  • The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

    Author Joshua Holden
  • Cryptography A Complete Guide - 2020 Edition

    Author Gerardus Blokdyk
  • Nomenclatura - Encyclopedia of modern Cryptography and Internet Security: From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback]

    Author BoD - Books on Demand
  • Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing

    Author Peter Bradley
  • Disk encryption A Complete Guide - 2019 Edition

    Author Gerardus Blokdyk
  • Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks

    Author Kip Boyle
  • Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

    Author Slava Gomzin
  • Cryptographic Algorithms The Ultimate Step-By-Step Guide

    Author Gerardus Blokdyk
  • Public-key cryptography A Complete Guide

    Author Gerardus Blokdyk
  • X, Y and Z: The Real Story of How Enigma Was Broken

    Author Dermot Turing
  • Alastair Denniston: Code-Breaking from Room 40 to Berkeley Street and the Birth of GCHQ

    Author Joel Greenberg
Explore more in Cryptography
Loading

Quick navigation

  • Home
  • Books
  • Audiobooks
  • Documents

Footer menu

Back to top

About

  • About Scribd
  • Press
  • Our blog
  • Join our team!
  • Contact us
  • Invite friends
  • Gifts
  • Scribd for enterprise

Support

  • Help / FAQ
  • Accessibility
  • Purchase help
  • AdChoices
  • Publishers

Legal

  • Terms
  • Privacy
  • Copyright
  • Do not sell or share my personal information

Social

  • Instagram Instagram
  • Twitter Twitter
  • Facebook Facebook
  • Pinterest Pinterest

Get our free apps

  • Scribd - Download on the App Store
  • Scribd - Get it on Google Play

About

  • About Scribd
  • Press
  • Our blog
  • Join our team!
  • Contact us
  • Invite friends
  • Gifts
  • Scribd for enterprise

Legal

  • Terms
  • Privacy
  • Copyright
  • Do not sell or share my personal information

Support

  • Help / FAQ
  • Accessibility
  • Purchase help
  • AdChoices
  • Publishers

Social

  • Instagram Instagram
  • Twitter Twitter
  • Facebook Facebook
  • Pinterest Pinterest

Get our free apps

  • Scribd - Download on the App Store
  • Scribd - Get it on Google Play
  • Books
  • Audiobooks
  • Magazines
  • Podcasts
  • Sheet music
  • Documents
  • Snapshots
Language:
English
  • English(selected)
  • Español
  • Português
  • Deutsch
  • Français
  • Русский
  • Italiano
  • Română
  • Bahasa Indonesia
Learn more
Copyright © 2023 Scribd Inc.
Language:
English
  • English(selected)
  • Español
  • Português
  • Deutsch
  • Français
  • Русский
  • Italiano
  • Română
  • Bahasa Indonesia
Learn more
Copyright © 2023 Scribd Inc.