Skip to main content



With the increase of personal, business and politically sensitive information stored electronically, the need for suitable security of this data grows. These resources to support courses in Cryptography provide the latest information in this field.

2019 | Book

The Blockchain Developer

A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects

Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, EOS and Hyperledger.

This book helps you understand Blockchain beyond development and …

Elad Elrom

2019 | Book

Waging Cyber War

Technical Challenges and Operational Constraints

Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their …

Jacob G. Oakley

2017 | Book

Blockchain Basics

A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required.

Daniel Drescher

2017 | Computer Science | Book

Personal Cybersecurity

How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal …

Marvin Waschke

2015 | Computer Science | Book

Enterprise Cybersecurity

How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing …

Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam

2013 | Computer Science | Book

Cryptography in C and C++

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter …

Michael Welschenbach

2008 | Computer Science | Book

Codes: An Introduction to Information Communication and Cryptography

Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involvedare quite ‘cl- sical’, such as …

N.L. Biggs

2016 | Computer Science | Book

Cryptography Made Simple

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are …

Nigel P. Smart

2015 | Computer Science | Book

Introduction to Cryptography

Principles and Applications

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user …

Hans Delfs, Helmut Knebl

2010 | Computer Science | Book

Understanding Cryptography

A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems …

Christof Paar, Jan Pelzl