The Hidden Code of Cryptic Crosswords – Francois Greeff
The Code Book – Simon Singh
Introduction to Cryptography - Johannes Buchman
A Treatise on the Art of Deciphering, and of Writing in Cypher: With a Harmonic Alphabet – Philip Thicknesse
Introduction to Modern Cryptography - Jonathan Katz, Yehuda Lindell
Cryptography: A Very Short History – Fred Piper, Sean Murphy
Unveiling Cicada 3301 - Bhavesh Tekwani
The Voynich Manuscript - Stephen Skinner
The Voynich Manuscript - Ramond Clemens, Deborah E. Harkness
Unsolved! – Craig P. Bauer
Codebreaker: The History of Secret Communication – Stephen Pincock, Mark Frary
Codes and Ciphers: A History of Cryptography – Alexander D’ Agapeyeff
Codes and Ciphers – Robert Churchhouse
Codebreaking: A Practical Guide – Elonka Dunin, Klaus Schmeh
Decrypted Secrets: Methods and Maxims of Cryptography – F. L. Bauer
The Mathematics of Secrets – Joshua Holden
Cryptanalysis – Helen Fouché Gaines
Encyclopaedia of Cryptology – David E. Newton
Cryptology: Classical and Modern – Richard Klima, Neil Sigmon
Cryptology: Machines, History & Methods – ‘Cipher A. Deavours’, Louis Kruh, David A. Kahn
Selections from Cryptologia – ‘Cipher A. Deavours’, Louis Kruh, David A. Kahn
Cryptologia, vol. VIII, no. I - David Kahn, Louis Kruh, Brian J. Winkel
The Venetian Ciphers of Agostino Amani – D. P. J. A. Scheers
Advances in Cryptology - Colin Boyd
The Friedman Lectures on Cryptology - William F. Friedman
Codes and Ciphers (Cryptology) - William F. Friedman
Basic Cryptologic Glossary - William F. Friedman
Advanced Military Cryptography - William F. Friedman
Military Cryptanalysis Part I: Monoalphabetic Substitution Systems, Fourth Edition – William F. Friedman
Military Cryptanalysis Part I: Polygraphic Substitution, Four Square and Two Square Matrices, Third Edition - William F. Friedman
Military Cryptanalysis Part II: Simpler Varieties of Polyalphabetic Substitution Cipher - William F. Friedman
Military Cryptanalysis Part III: Small Types of Aperiodic Substitution System (Introduction and Lesson One) – William F. Friedman
Military Cryptanalysis Part IV: Transposition and Fractionating Systems - William F. Friedman
S. I. Course Section IV: Poly-Alphabetic Ciphers – William F. Friedman
The Index of Coincidence - William F. Friedman
Synoptic Tables for the Solution of Ciphers and a Bibliography of Cipher Literature - William F. Friedman
Ref ID: A69073, Technical Papers - William F. Friedman
Ref ID: A69531, Technical Papers – William F. Friedman
Statistical Methods in Cryptanalysis, Revised Edition – Solomon Kullback
General Solution for the Double Transposition Cipher – Solomon Kullback
Solving Cipher Problems – Frank W. Lewis
Articles on Cryptography and Cryptanalysis – The Signal Corps Bulletin
Theory of Cryptography - Mono Naor
Handbook of Applied Cryptography - A. Menezes, P. van Oorschot, S. Vanstone
Cryptanalysis of the Hagelin Cryptograph - Wayne G. Barker
Introduction to Modern Cryptography – Jonathan Katz, Yehuda Lindell
Real-World Cryptography – David Wong
Serious Cryptography: A Practical Introduction to Modern Encryption – Jean-Philippe Aumasson
Modern Cryptanalysis: Techniques for Advanced Codebreaking - Christopher Swenson
Introduction to Cryptography with Coding Theory – Wade Trappe, Lawrence C. Washington
Codes and Automata – Jean Berstel, Dominique Perrin, Christophe Reutenauer
Elementary Number Theory, Cryptography, and Codes – M. Welleda Baldoni, Ciro Ciliberto, G. M. Piacentini Cattaneo
Mathematics of Public Key Cryptography – Steven D. Galbraith
Cryptanalysis of the SoDark Family of Cipher Algorithms - Marcus Danserie
Lai-Massey Cipher Designs - Jorge Nakahara Jr.
The Taman Shud Cipher - J. N. Amour
The Block Cipher Companion - Lars R. Knudsen, Matthew Robshaw
Feistel Ciphers - Valerie Nachef, Jacques Paterin, Emmanuel Volte
Cryptography and Data Security - Daniel Garfield
Cryptography Engineering: Design Principles and Practical Applications – Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
Hiding in Plain Sight – Eric Cole
Steganography, the Art of Hiding Information – Karen Bailey, Kevin Curran
Steganography, the World of Secret Communications – Michael Hegarty
Noiseless Steganography: The Key to Covert Communication – Abdelrahman Desoky
Integrated Research in Steganography – Audrey Coon
Steganography in Digital Media: Principles, Algorithms, and Applications – Jessica Fridrich
Optimal Soft Computing for Audio Steganography – Abhay Pandy
Audio Steganography using Combined Approach of Compression & Cryptography – Anju Gera
Hiding Data in VoIP - Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski
Statistically Undetectable Steganography - Jessica Fridrich
Spycomm: Covert Communication Techniques of the Underground – Lawrence W. Myers
Clandestine Communication Systems – John T. Corley
Obfuscation: A User’s Guide for Privacy and Protest – Finn Brunton, Helen Nissenbaum
Cyber Deception: Techniques, Strategies, and Human Aspects – Tiffany Bao, Milind Tambe, Cliff Wang
Spies in the Sky: Surveillance Satellites in War and Peace – Pat Norris
Strategic Defense Systems of the Future – Philip Margulies
Teller’s War – William J. Broad
Space Weapons and the Strategic Defense Initiative – Crockett L. Grabbe
War in Space: The Science and Technology Behind Our Next Theater of Conflict – Linda Dawson
Space and Defense Policy – Damon Coletta, Frances T. Pilch
Original Sin: Power, Technology and War in Outer Space – Bleddyn E. Bower
War in Space: Strategy, Spacepower, Geopolitics – Bleddyn E. Bower
Space Warfare in the 21st Century: Arming the Heavens – Joan Johnson-Freese
Space Electronic Warfare - David L. Adamy
Electronic Warfare Against a New Generation of Threats – David L. Alamy
Introduction to Electronic Defense Systems, Second Edition – Fillipo Neri
Information Warfare: Principles and Operations - Edward Waltz
Electronic Warfare in the Information Age – D. Curtis Schleher
Design and Analysis of Modern Tracking Systems – Samuel Blackman, Robert Popoli
Electronic Warfare: Receivers and Receiving Systems – Richard A. Poisel
RF Electronics for Electronic Warfare – Richard A. Poisel
Modern Communications Jamming: Principles and Techniques – Richard A. Poisel
How the World was One: Turbulent History of Global Communications - Arthur C. Clarke
Satellite Communications Systems: Systems, Techniques, and Technology, Sixth Edition – Gerard Maral, Michael Bousquet, Zhili Sun
Where Wizards Stay Up Late: The Origins of the Internet – Katie Hafner, Michael Lyon
Surveillance Valley: A Secret Military History of the Internet – Yasah Levine
The ARPAnet Sourcebook: The Unpublished Foundations of the Internet – Peter H. Salus
The Sigint Secrets: The Signals Intelligence War 1900 to Today – Nigel West
Historical Dictionary of British Intelligence – Nigel West
Electronic Communication Interception Technologies and Issues of Power – Daniel Ventre, Philippe Guillot
GPS Declassified: From Smart Bombs to Smartphones – Richard D. Easton, Eric F. Frazier
A Short Introduction to Geospatial Intelligence - Jack O'Connor
Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection – Ali Serhan Koyuncugil, Nermin Ozgulbas
Electronic Surveillance Devices – Paul Brookes
Hacking with Hardware Gadgets – Mark B.
Big Brother Technology: PRISM, XKeyscore and Other Spy Tools of the Global Surveillance State – Axel Balthazar
State-Sponsored Worms: A Look into the Evolution of Cyber Warfare – Benjamin Stephenson
Stuxnet to Sunburst: Twenty Years of Digital Exploitation and Cyber Warfare – Andrew J. Jenkinson
Modelling Nation-state Information Warfare and Cyber-operations – Brett Van Niekerk, Tishana Ramluckan, Neal Kushwaha
Means of Control: How the Hidden Alliance of Tech and Government is Creating a New American Surveillance – Byron Tau
The Big Black Book of Electronic Surveillance – Edward Teach
Handbook of Surveillance Technologies, Third Edition – Julie K. Petersen
Wiretapping and Electronic Eavesdropping – G Stevens, C. Doyle
Surveillance Countermeasures – Aden C. Magee
Practical Anonymity – Peter Loshin
An Ethical Guide to Cyber Anonymity - Kushantha Gunawardana
Is My Cell Phone Bugged? Everything You Need to Know to Keep Your Mobile Conversations Private - Kevin D. Murray
Digital Data: Develop an Effective Data Destruction Policy – Aisha Soldner
Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing – Peter Christen, Thilina Ranbaduge, Rainer Schnell
The Complete Privacy and Security Desk Reference – Michael Bazzell, Justin Carroll
Hiding From the Internet: Eliminating Personal Online Information, Third Edition - Michael Bazzell
Extreme Privacy, Fourth Edition - Michael Bazzell
Whistleblowers, Leakers, and Their Networks: From Snowden to Samizdat – Jason Ross Arnold
Permanent Record: A Memoir of a Reluctant Whistleblower - Edward Snowden
Dark Mirror: Edward Snowden and the Surveillance State - Barton Gellman
Google Leaks: A Whistleblower’s Exposé of Big Tech Censorship – Zach Vorhies, Kent Heckenlively
Whistleblower’s Handbook: A Step-by-Step Guide to Doing What’s Right and Protecting Yourself – Stephen Martin Kohn
Truth Teller’s Shield: A Manual for Whistle Blowers and Hell Raisers, the Theory and Practice of Letting Your Truth, and The Truth Prevail – Kevin Daniel Annett
An Introduction to Formal Language Theory – Robert N. Moll, Michael A. Arbib, A. J. Kfoury
Formal Language and Automata Theory, Second Edition – Ajit Singh
A First Course in Formal Language Theory – V. J. Rayward-Smith
A Second Course in Formal Languages and Automata Theory – Jeffrey Shallit
Build Your Own Website the Right Way Using HTML & CSS, Third Edition – Ian Lloyd
The C++ Programming Language, Fourth Edition – Bjarne Stroustrup
Effective C++: 55 Specific Ways to Improve Your Programs and Designs – Scott Meyers
The Art of Functional Programming – Minh Quang Tran
Introduction to Networking: How the Internet Works – Charles R. Severance
Ipv4 Addressing, Subnetting & VLSM Workbook: CCNA 200-301 – S. Rajkumar, Rajasekar VR
A Professional’s Guide to Data Communication in a TCP/IP World – E. Bryan Carne
TCP/IP Illustrated: vol. 1, The Protocols, Second Edition – Keven R. Fall, W. Richard Stevens
TCP/IP Illustrated: vol. 2, The Implementation – Gary R. Wright, W. Richard Stevens
TCP/IP Illustrated: vol. 3, TCP for Transactions, HTTP, NNTP, and the Unix Domain Protocols – W. Richard Stevens
Build Your Own VPN Server: A Step-by-Step Guide - Lin Song
Set up your own IPsec VPN, OpenVPN and WireGuard Server - Lin Song
Linux Field Manual – Tim Bryant
Operating Systems: Three Easy Pieces – Remzi H. Arpaci-Dusseau, Andrea C. Apraci-Dusseau
Risk Assessment and Decision Analysis with Bayesian Networks, Second Edition – Norman Fenton, Martin Neil
Operator Handbook - Joshua Picolet
Reversing: Secrets of Reverse Engineering – Eldam Eilam
X86 Software Reverse Engineering, Cracking and Counter-Measures – Stephanie Domas, Christopher Domas
Blue Fox: Arm Assembly Internals and Reverse Engineering – Maria Markstedter
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly – Dennis Andriesse
Malware Forensics Field Guide for Windows Systems – Cameron H. Malin, Eoghan Casey, James M. Aquilina
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats – Alex Matrosov, Eugene Rodionov, Sergey Bratus
The Art of Attack: Attacker Mindset for Security Professionals – Maxie Reynolds
Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation – James Forshaw
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things – Fotios Chantzis, Ioannis Stais
Grey Man: Camouflage for Crowds, Cities, and Civil Crisis - Matthew Dermody
Grey Man 2: Intermediate Skills and Tactics – Matthew Dermody
Conversational Camouflage: Oratory Discretion and Pretexting for Behavioural Concealment – Matthew Dermody
Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets – Noel Hendrickson
Activity-Based Intelligence: Principles and Applications – Patrick Biltgen, Stephen Ryan
Critical Thinking and Intelligence Analysis – David T. Moore
Critical Thinking for Strategic Intelligence – Katherine H. Pherson, Randolph H. Pherson
Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis – Jeffrey R. Cooper
Counterintelligence: Theory and Practice, Second Edition – Hank Prunckun
Methods of Inquiry for Intelligence Analysis – Hank Prunckun
Scientific Methods of Inquiry for Intelligence Analysis, Second Edition – Hank Prunckun
The Lockwood Analytical Method for Prediction (LAMP): A Method for Predictive Intelligence Analysis – Jonathan Samuel Lockwood
Counterdeception Principles and Applications for National Security – Michael Bennett, Edward Waltz
Deception: Counterdeception and Counterintelligence - Robert M. Clark, William L. Mitchell
Intelligence Gathering – Orlando Wilson
Getting Started with OSINT – Mark B.
OSINT Techniques: Resources for Uncovering Online Information, Tenth Edition - Michael Bazzell
Offensive Intelligence: 300 Techniques, Tools, and Tips to Know Everything About Everyone, in Companies or Elsewhere, Third Edition – Philippe Dylewski
The Grey Line: Modern Corporate Espionage and Counterintelligence – Andrew Brown
Of Moles and Molehunters: A Review of Counterintelligence Literature, 1977-92 – Center for the Study of Intelligence
Intelligence Oversight in Times of Transnational Impunity: Who Will Watch the Watchers? – Didier Bigo, Emma Mc Cluskey, Félix Tréguer
Kommentare