Click here to learn more about these products.
Serious Cryptography: A Practical Introduction to Modern Encryption
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data
Apricorn 6TB Aegis Padlock DT 256-Bit Encryption USB 3 Hard Drive (ADT-3PL256-6000)
Separate Admin and User Modes. Aegis Configurator Compatible. Admin and User Forced Enrollment. Data Reovery PIN's. Programable Brute-Force Defense. 6TB 7200 RPM Helium filled drive. Secure Pin Access. Brute Force Self Destruct. Super speed USB 3.0. Compatible with any OS. Software free design - No admin rights required. Solid aluminum enclosure. Lock slot for physical security.
'Til Encryption Do Us Part (The Vikings MC Book 4)
Encrypt Everything - Internet Hacker Encryption T-Shirt
Whether you're an internet security professional, white hat hacker or just care about your data, tell the world to encrypt everything with this computer technology tee shirt. If you care about security, networks, data, encryption, the internet or just technology in general this is the shirt for you. Lightweight, Classic fit, Double-needle sleeve and bottom hem.
The Mathematics of Encryption: An Elementary Introduction (Mathematical World)
BenQ InstaShow WDC10 Wireless Presentation Screen Mirroring for Meeting Rooms, Enterprise-Grade Security encryption, Includes 2 HDMI transmitters (up to 16) & Holder, 33ft Range, 60fps, no app Needed
Plug In for Instant Collaboration - is an all-hardware solution that is ready to present in seconds after its plugged into any laptop or device. Ideal for conference rooms that host visitors. No App or Software Required - Comes with two buttons instant for huddle rooms and shared work spaces, it eliminates the need for IT support and security risk associated with loading third party apps on notebooks. Switch Presenters with a Touch of a Button - delivers efficient meetings with intuitive technology that changes the presenter by simply pressing the button on the transmitter you want to show on the screen. Trustworthy Security for Enterprise - uses AES 128-bit security encryption WPA2 authentication protocols to safeguard presentations from wireless snooping and recording. Smooth Video and Crisp PowerPoints- has a special video button on each transmitter to optimize videos for smooth playback without affecting network bandwidth.