Best Computer Cryptography Books
Cryptography is an indispensable tool for protecting information in computer systems.
1. The Bitcoin Standard: The Decentralized Alternative to Central Banking
Author: by Saifedean Ammous
When a pseudonymous programmer introduced a new electronic cash system that’s fully peer-to-peer, with no trusted third party to a small online mailing list in 2008, very few paid attention. Ten years later, and against all odds, this upstart autonomous decentralized software offers an unstoppable and globally-accessible hard money alternative to modern central banks.
The Bitcoin Standard analyzes the historical context to the rise of Bitcoin, the economic properties that have allowed it to grow quickly, and its likely economic, political, and social implications. While Bitcoin is a new invention of the digital age, the problem it purports to solve is as old as human society itself: transferring value across time and space.
Ammous takes the reader on an engaging journey through the history of technologies performing the functions of money, from primitive systems of trading limestones and seashells, to metals, coins, the gold standard, and modern government debt. Exploring what gave these technologies their monetary role, and how most lost it, provides the reader with a good idea of what makes for sound money, and sets the stage for an economic discussion of its consequences for individual and societal future-orientation, capital accumulation, trade, peace, culture, and art.
2. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))
Author: by Wm. Arthur Conklin
This fully updated study guide covers every topic on the current version of the CompTIA Security+ examGet complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software.
You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including:Threats, Attacks, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceOnline content includes:250 practice exam questionsTest engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain
3. Blockchain Bubble or Revolution: The Future of Bitcoin, Blockchains, and Cryptocurrencies
Author: by Neel Mehta
Some experts say that Bitcoin and cryptocurrencies are just a scam; others say they’re “the most important invention since the internet.” It’s hard to tell who’s right. Authored by Silicon Valley leaders from Google, Microsoft, and Facebook, Bubble or Revolution cuts through the hype to offer a balanced, comprehensive, and accessible analysis of blockchains and cryptocurrencies.
You’ll learn the core concepts of Bitcoin and blockchain technologies to understand their strengths and weaknesses from real-world case studies; dive deep into their technical, economic, political, and legal complexities; and gain insights about their future from exclusive interviews with dozens of tech industry leaders.
Are blockchains and cryptocurrencies like Bitcoin a bubble or a revolution? We’ll help you decide for yourself. What’s inside:Bitcoin and the blockchainHow Bitcoin and blockchains work from a technical perspective with no assumed technical knowledgeSatoshi Nakamoto and the history of Bitcoin, the original blockchainA thorough overview of crucial crypto concepts (eg.
Mastering Bitcoin: Programming the Open Blockchain
Author: by Andreas M. Antonopoulos
Join the technological revolution that’s taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you’re building the next killer app, investing in a startup, or simply curious about the technology, this revised and expanded second edition provides essential detail to get you started.
Bitcoin, the first successful decentralized digital currency, is still in its early stages and yet it’s already spawned a multi billion dollar global economy. This economy is open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides the knowledge.
You simply supply the passion. The second edition includes:A broad introduction to bitcoin ideal for non technical users, investors, and business executivesAn explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architectsDetails of the bitcoin decentralized network, peer to peer architecture, transaction lifecycle, and security principlesNew developments such as Segregated Witness, Payment Channels, and Lightning NetworkImproved explanations of keys, addresses and walletsUser stories, analogies, examples, and code snippets illustrating key technical concepts
5. Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)
Author: by Mike Meyers
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security.
Within each chapter, modules drill down on specific exam objectives, providing a clear learning path. All official exam objectives are covered, and chapter-ending practice exam questions reinforce the concepts presented. This practical resource goes beyond knowledge application and teaches you the skills you need to anticipate security risks and guard against them.
Covers all the exam topics, including:Risk managementCryptographyAuthentication and authorizationHost, LAN, and application securityWireless, cloud, and mobile securityEnvironmental security and controlsOnline content includes:200+ practice exam questions in a customizable test engineOne hour+ of video training from Mike MeyersFree lab simulationsMike’s toolbox of favorite network securityrelated freeware and shareware
6. Mastering Ethereum: Building Smart Contracts and DApps
Author: by Andreas M. Antonopoulos
If you’re looking to get started with the Ethereum protocol-or are among the many open source developers, integrators, and system administrators already working with this platform-Mastering Ethereum is the definitive book on the topic. Ethereum represents the gateway to a worldwide, decentralized computing paradigm.
This platform enables you to run decentralized applications (DApps) and smart contracts that have no central points of failure or control, integrate with a payment network, and operate on an open blockchain. With this practical guide, Andreas M. Antonopoulos and Gavin Wood provide everything you need to know about building smart contracts and DApps on Ethereum and other virtual-machine blockchains.
Discover why IBM, Microsoft, NASDAQ, and hundreds of other organizations are experimenting with Ethereum. This essential guide shows you how to develop the skills necessary to be an innovator in this growing and exciting new industry.
7. Hacking: The Art of Exploitation, 2nd Edition
Author: by Jon Erickson
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.
The included LiveCD provides a complete Linux programming and debugging environmentall without modifying your current operating system. Use it to follow along with the book’s examples as you fill gaps in your knowledge and explore hacking techniques on your own.
Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrixHackers are always pushing the boundaries, investigating the unknown, and evolving their art.
8. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Author: by Mike Chapple
NOTE: The CISSP objectives the books in this set covered were issued in 2018. For coverage of the most recent CISSP objectives effective in April 2021, please look for the latest edition of this set: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle, 3rd Edition (ISBN: 9781119790020).
This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC) CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam.
(ISC) CISSP Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You’ll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more.
9. Internet Password Logbook (Cognac Leatherette): Keep track of: usernames, passwords, web addresses in one easy & organized location
Author: by Editors of Rock Point
Just say no to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed cognac leatherette notebook. In this 4 6 hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers.
You’ll find: Internet password safety and naming tipsA to Z tabbed pages with space to list website, username, and five passwords for eachDedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly feeDedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wirelessA notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.
10. Cybersecurity For Dummies
Author: by Joseph Steinberg
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime and to defend yourself before it is too late.
11. Eleventh Hour CISSP®: Study Guide
Author: by Eric Conrad
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying.
Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge.
All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
12. Password Book Organizer Alphabetical: 8.5 x 11 Password Notebook with Tabs Printed | Smart Black Design
Author: by Emily Grace
Book DescriptionSometimes, especially when needed, we forget our login info to access a website. Often, we try to flip and flip pages of a notebook to find username and password for a website. We wrote it our own, but which page?
It’s really frustrating, and it’s also waste of time. That’s why we need to use a password notebook with alphabetical sections. This type of book is popular for elderly people, because they seem to forget their passwords easily. It could also be that senior people usually have to learn a lot of things in the fast-moving world, and then they just don’t want to memorize the passwords.
Though, password keeper notebook is still perfect for people in any ages, who having a problem with memorizing their password. Specification of this bookThis password book is 8. 5″ x 11″ size, large. It work well for those who are looking for a password book with large space.
This large-size book is suitable for home use rather than portable though. This password book contain extra-large-print text for easy to see. It is a perfect password book for elderly and anyone prefer large font. There are 106 pages, 53 white-paper sheets, in this password notebook.
13. Mastering Blockchain: A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more, 3rd Edition
Author: by Imran Bashir
Develop a deeper understanding of what’s under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologiesKey FeaturesUpdated with four new chapters on consensus algorithms, Ethereum 2. 0, tokenization, and enterprise blockchainsLearn about key elements of blockchain theory such as decentralization, cryptography, and consensus protocolsGet to grips with Solidity, Web3, cryptocurrencies, smart contract development and solve scalability, security and privacy issuesDiscover the architecture of different distributed ledger platforms including Ethereum, Bitcoin, Hyperledger Fabric, Hyperledger Sawtooth, Corda and QuorumBook DescriptionBlockchain is the backbone of cryptocurrencies, with applications in finance, government, media, and other industries.
With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated to the latest blockchain research with four new chapters on consensus algorithms, Serenity (the update that will introduce Ethereum 2. 0), tokenization, and enterprise blockchains.
14. CompTIA A+ Certification All-in-One For Dummies
Author: by Glen E. Clarke
Fully updated to cover the 2019 exam release! CompTIA’s A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this bookplus online test bankwill help you reach your certification goal.
The 9 minibooks map to the exam’s objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You’ll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You’ll also find test-taking advice and a review of the types of questions you’ll see on the exam.
Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!
15. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Author: by Simon Singh
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it.
It will also make you wonder how private that e-mail you just sent really is.