1.
Martin, K. M. Everyday Cryptography: Fundamental Principles and Applications. (Oxford University Press, 2017).
2.
Martin, K. M. Everyday Cryptography: Fundamental Principles and Applications. (Oxford University Press, 2017).
3.
Piper, F. & Murphy, S. Cryptography: A Very Short Introduction. vol. Very short introductions (Oxford University Press, 2002).
4.
Piper, F. C. & Murphy, S. Cryptography: A Very Short Introduction. (Oxford University Press, 2002).
5.
Ferguson, N. Cryptography Engineering: Design Principles and Practical Applications. (Wiley, 2010).
6.
Ferguson, N. Cryptography Engineering: Design Principles and Practical Applications. (Wiley, 2012).
7.
Levy, S. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. (Penguin, 2002).
8.
Corera, G. Intercept: The Secret History of Computers and Spies. (Weidenfeld & Nicolson, 2015).
9.
Dent, A. W. & Mitchell, C. J. User’s Guide to Cryptography and Standards. vol. Artech House computer security series (Artech House, 2005).
10.
Dent, A. W. & Mitchell, C. User’s Guide to Cryptography and Standards. vol. Artech House computer security series (Artech House, 2005).
11.
Mel, H. X. & Burnett, D. Cryptography Decrypted. (Addison-Wesley, 2001).
12.
Schneier, B. Applied Cryptography: Protocols, Algorithms and Source Code in C. (Wiley, 1996).
13.
Singh, S. The Code Book: The Secret History of Codes and Codebreaking. (Fourth Estate, 2000).
14.
Stinson, D. R. Cryptography: Theory and Practice. vol. Discrete Mathematics and Its Applications (Chapman & Hall/CRC, 2006).