[1]
Corera, G. 2015. Intercept: The Secret History of Computers and Spies. Weidenfeld & Nicolson.
[2]
Dent, A.W. and Mitchell, C. 2005. User’s Guide to Cryptography and Standards. Artech House.
[3]
Dent, A.W. and Mitchell, C.J. 2005. User’s Guide to Cryptography and Standards. Artech House.
[4]
Ferguson, N. 2010. Cryptography Engineering: Design Principles and Practical Applications. Wiley.
[5]
Ferguson, N. 2012. Cryptography Engineering: Design Principles and Practical Applications. Wiley.
[6]
Levy, S. 2002. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. Penguin.
[7]
Martin, K.M. 2017. Everyday Cryptography: Fundamental Principles and Applications. Oxford University Press.
[8]
Martin, K.M. 2017. Everyday Cryptography: Fundamental Principles and Applications. Oxford University Press.
[9]
Mel, H.X. and Burnett, D. 2001. Cryptography Decrypted. Addison-Wesley.
[10]
Piper, F. and Murphy, S. 2002. Cryptography: A Very Short Introduction. Oxford University Press.
[11]
Piper, F.C. and Murphy, S. 2002. Cryptography: A Very Short Introduction. Oxford University Press.
[12]
Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley.
[13]
Singh, S. 2000. The Code Book: The Secret History of Codes and Codebreaking. Fourth Estate.
[14]
Stinson, D.R. 2006. Cryptography: Theory and Practice. Chapman & Hall/CRC.