Games
Apps
Books
Kids
google_logo Play
  • Sign in with Google
  • play_appsLibrary & devices
  • paymentPayments & subscriptions
  • reviewsMy Play activity
  • redeemOffers
  • Play Pass
  • Personalization in Play
  • settingsSettings
  • Privacy Policy • Terms of Service
Games
Apps
Books
Kids
Similar ebooks
Icon image Leakage Resilient Password Systems
Leakage Resilient Password Systems
€54.49€38.14
Icon image Mastering Ethereum: Building Smart Contracts and DApps
Mastering Ethereum: Building Smart Contracts and DApps
€41.41
Icon image Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
€35.96€25.17
Icon image RFID Security and Privacy
RFID Security and Privacy
€35.96€25.17
Icon image Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
€14.78
Icon image Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I
Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I
Book 254
€54.49€38.14
Icon image Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
€17.99
Icon image Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy
€21.80
Icon image || BTC MINING || how to properly mime for BItcoin || MR. BIG WEALTH
|| BTC MINING || how to properly mime for BItcoin || MR. BIG WEALTH
€0
Icon image The NFT Handbook: How to Create, Sell and Buy Non-Fungible Tokens
The NFT Handbook: How to Create, Sell and Buy Non-Fungible Tokens
€16.99
Icon image Applied Cryptography: Protocols, Algorithms and Source Code in C, Edition 2
Applied Cryptography: Protocols, Algorithms and Source Code in C, Edition 2
€47.99
Icon image Dark Territory: The Secret History of Cyber War
Dark Territory: The Secret History of Cyber War
€17.88
Icon image Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
€28.99
Icon image || D A T A E N C R Y P T I O N || Data Encryption, Keep files safe from hackers and viruses ||
|| D A T A E N C R Y P T I O N || Data Encryption, Keep files safe from hackers and viruses ||
€0
Icon image Mastering Blockchain
Mastering Blockchain
€35.96€25.17
Icon image Building the Infrastructure for Cloud Security: A Solutions View
Building the Infrastructure for Cloud Security: A Solutions View
€0
Icon image Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
€20.11
Icon image Android Security Cookbook
Android Security Cookbook
€31.60€22.12
Icon image The Dark Web Guide: Ethical Exploration & Cyber Threats
The Dark Web Guide: Ethical Exploration & Cyber Threats
€1.99
Icon image Cryptography For Dummies
Cryptography For Dummies
€26.99
Google Play

Play Pass

Play Points

Gift cards

Redeem

Refund policy

Kids & family

Parent Guide

Family sharing

Terms of Service

Privacy

About Google Play

Developers

Google Store

All prices include VAT.