To Read

By Nympho


[en] Decoded Farrar, Straus and Giroux

[en] The Woman Who Smashed Codes Dey Street Books

[en] Security for Wireless Sensor Networks using Identity-Based Cryptography Auerbach Publications

Patil, Harsh Kupwade & Szygenda, Stephen A.

[en] [Very Short Introductions 068] • Cryptography Oxford University Press, USA

Murphy, Sean & Piper, Fred

[en] Clojure Applied · From Practice to Practitioner The Pragmatic Bookshelf

Vandgrift, Ben & Miller, Alex

[en] Serious Cryptography No Starch Press

Aumasson, Jean-Philippe

[en] The Block Cipher Companion (Information Security and Cryptography) Springer Berlin Heidelberg

Knudsen, Lars R. & Robshaw, Matthew

[en] Applied Mathematics for Engineers and Physicists Dover Publications

Pipes, Louis A. & Harvill, Lawrence R.

[en] Everyday Cryptography Oxford University Press, USA

Martin, Keith M.

[en] Public Key Cryptography Wiley-IEEE Press

Batten, Lynn Margaret

[en] Java Cryptography O'Reilly Media

Knudsen, Jonathan

[en] Disappearing Cryptography Morgan Kaufmann Publishers

[en] MongoDB and Python O'Reilly Media

O'Higgins, Niall

[en] The Art of Lean Software Development O'Reilly Media

Sullivan, Mike & Jewett, Steve & Hibbs, Curt

[en] NLP William Morrow Paperbacks

[en] Algorithms to Live By Harper Collins Publishers

Christian, Brian

[en] Neural Network Programming with Java · 2nd Edition Packt Publishing

Soares, Fabio M. & Souza, Alan M.F.

[en] Macroeconomics · Private and Public Choice South Western Educational Publishing

Gwartney, James D. & Stroup, Richard L. & Sobel, Russell S. & Macpherson, David A.

[en] Machine Learning with R Second Edition Packt Publishing

problems, Second Edition 25e2 2580 25a2 Expert techniques for predictive modeling to solve all your data analysis

[en] 7 Secrets of Persuasion Career Press

Crimmins, James C.