Deal of the Day
Deal of the Day! Hacking Cryptography—Save 45% TODAY ONLY!
Checkout before this deal expires at midnight, US Eastern time.

Learn the “lockpicks” that bad actors use to exploit security protocols, firewalls, and other cryptography-based protection schemes. This book dives deep into each cryptographic exploit, explaining complex concepts in detail through real-world analogies, code annotations, and pseudo-code.

Plus, the same offer also applies to Real-World Cryptography, Secret Key Cryptography, Elliptic Curve Cryptography for Developers, and Learn Privacy-Enhancing Techniques with Cryptographic Games.