FreeComputerBooks.com
Free Computer, Mathematics, Technical Books and Lecture Notes, etc.



Handbook of Applied Cryptography (Alfred J. Menezes, et al)
This book is an incredible achievement. If you want to check what problems there were with a proposed system, determine how the variations on a particular algorithm developed, see what research preceded and followed an idea, go to the Handbook.

A Graduate Course in Applied Cryptography (Dan Boneh, et al)
This book is about mathematical modeling and proofs to show that a particular cryptosystem satisfies the security properties attributed to it: constructing practical cryptosystems for which we can argue security under plausible assumptions.

Cryptography: An Introduction, 3rd Edition (Nigel Smart)
This book provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.

Fundamentals of Cryptology: A Professional Reference (H. Tilborg)
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.

Theory and Practice of Cryptography and Network Security Protocols
This book discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges.

Cryptography and Computer Security (Chris Bourke, et al)
This book introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security.

Cryptography and Security in Computing (Jaydip Sen)
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography mechanisms.

Cracking Codes with Python: Building and Breaking Ciphers
Learn how to program in Python while making and breaking ciphers  algorithms used to create and send secret messages! You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, etc.

Mastering Ethereum: Building Smart Contracts and DApps
The book is intended to serve both as a reference manual and as a covertocover exploration of Ethereum. If you're looking to get started with the Ethereum protocol (open source developers, integrators, etc.), this is the definitive book on the topic.

Mastering Bitcoin: Programming the Open Blockchain
This book is your guide through the seemingly complex world of Bitcoin, providing the knowledge you need to participate in the internet of money. It will help you engineer money. You're about to unlock the API to a new economy. This book is your key.

Bitcoin and Cryptocurrency Technologies (Arvind Narayanan, ...)
It provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. This authoritative and selfcontained book tells you everything you need to know about the new global money for the Internet age.

Practical Cryptography With Go (Kyle Isom)
This is an introduction to cryptography using The Go Programming Language. It doesn't aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services.

Visual Cryptography and Its Applications (Jonathan Weir, et al)
In this book, one of the data security methods known as Visual Cryptography (VC) is presented. Many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments.

Cryptography in .NET Succinctly (Stephen Haunts)
You will learn various methods to implement cryptography in .NET apps, including using the SHA, AES, and RSA hash algorithms, leveraging symmetric and asymmetric encryption, and creating digital signatures.

Hacking Secret Ciphers with Python (Albert Sweigart)
This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers.

Python and Coding Theory (David Joyner)
This is the lecture notes for a course on Python and coding theory designed for students who have little or no programmig experience. You will learn some of the Python computer programming language and selected topics in coding theory.

Applied Cryptography and Network Security (Jaydip Sen)
This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks.

Modern Cryptography, Probalistic Proofs and Pseudorandomness
This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness.

Advances in Cryptology  CRYPTO '96 (Neal Koblitz)
These proceedings contain the revised versions of the 30 contributed talks. The submitted version of each paper was examined by at mittee members and/or outside experts, and their comments were taken into account in the revisions.

The Foundations of Cryptographys (Oded Goldreich)
This free book focuses on the basic mathematical tools needed for for cryptographic design: computational difficulty (oneway functions), pseudorandomness and zeroknowledge proofs.

Coding Theory and Cryptography: From Enigma to Quantum Theory
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory.

Network Coding Theory (R. W. Yeung, et al)
This book provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality.

Essential Coding Theory (Venkatesan Guruswami, et al)
This book introduces the reader to the theoretical foundations of errorcorrecting codes, with an emphasis on ReedSolomon codes and their derivative codes. It describes ReedSolomon codes and various decoding algorithms.

ErrorCorrection Coding and Decoding (Martin Tomlinson, et al)
This book discusses both the theory and practical applications of selfcorrecting data, commonly known as errorcorrecting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies.

Algorithmic Number Theory: Lattices, Curves, and Cryptography
This text provides a comprehensive introduction to algorithmic number theory for beginning graduate students, written by the leading experts in the field.

Introductory Number Theory Textbook (Cryptology Emphasis)
This introductory number theory textbook has a particular emphasis on connections to cryptology. It broaches the subject of these cryptologic algorithms to develop connections to the topic of number theory.

A Computational Introduction to Number Theory and Algebra
This introductory book emphasises algorithms and applications, such as cryptography and error correcting codes, and is accessible to a broad audience.

Military Cryptanalysis  Part I: Monoalphabetic Substitution Systems
This book is one of the most wellrespected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Part I is the first publication in a series of four and focuses on monoalphabetic substitution systems.

Military Cryptanalysis  Part II: Polyalphabetic Substitution Systems
This book is the second publication in a series of four and focuses on polyalphabetic substitution systems.

Military Cryptanalysis  Part III: Aperiodic Substitution Systems
This book is the third publication in a series of four and focuses on Aperiodic substitution systems.

Military Cryptanalysis  Part IV: Transposition and Fractioning
This book is the fourth publication in a series of four and focuses on both transposition and fractioning systems.

PublicKey Cryptography: Theory and Practice (Bodo Moeller)
This book examines multiple aspects of publickey cryptography. It covers the theory of provably secure publickey cryptography and the implementation of exponentiation and multiexponentiation. An introduction to provable security is provided.

Rethinking Public Key Infrastructures and Digital Certificates
In this book, the author proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.

Cryptography's Role in Securing the Information Society
This book addresses the need for a strong national policy on cryptography that protects the information interests of individuals and businesses while respecting the needs of law enforcement and intelligence for national security and foreign policy purposes.

Computer Arithmetic of Geometrical Figures (Solomon Khmelnik)
The book is designed for using the computer arithmetic of geometrical figures in their own research and development in the field of specialized processors. It covers both the affine transformations and the figures coding theory

Building Blockchain Projects (Narayan Prusty)
This book will teach you what Blockchain is, how it maintains data integrity, and how to create realworld Blockchain projects using Ethereum. It is for JavaScript developers who now want to create tamperproof data (and transaction) apps using Blockchain.




















