INVITATION TO CYBERSECURITY 332 Singh, S. (2000). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books. Skoudis, E., & Liston, T. (2006). Counter Hack Reloaded: A Step-by-step Guide to Computer Attacks and Effective Defenses. Pearson. Soni, J., & Goodman, R. (2017). A Mind at Play: How Claude Shannon invented the Information Age. Simon & Schuster. Stallings, W., & Brown, L. (2015). Computer Security: Principles and Practice. Prentice Hall. Stamp, M. (2011). Information Security: Principles and Practice. John Wiley & Sons. Stamp, M., & Low, R. M. (2007). Applied Cryptanalysis: Breaking Ciphers in the Real World. John Wiley & Sons. Stoll, C. (1990). The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books. Trappe, W., & Washington, L. C. (2006). Introduction to Cryptography: With Coding Theory. Pearson. Tzu, S. (1971). The Art of War (S. Griffith, Trans.). Oxford : Clarendon Press. Walker, M. (2016). CEH Certified Ethical Hacker All-in-One Exam Guide, Third edition. McGraw-Hill Education. Wang, W. (2006). Steal this Computer Book 4.0: What They Won’t Tell You About the Internet. No Starch Press.
RkJQdWJsaXNoZXIy MTM4ODY=