Free Cyber Security PDF Library: From Basics to Advanced

Computer Security focuses on protecting systems and data from threats, covering cryptography, network security, ethical hacking, and cybersecurity best practices.

35 Courses
55,026 Total Downloads

Cyber Security for Beginners

Description: Learn the fundamentals of cyber security, master key terms, protect your data, and understand how to defend against online threats with this beginner-friendly guide.

Size: 6.09 MB Downloads: 5,736

Security of Ubiquitous Computing Systems

Description: Explore essential research papers on cryptography, covering attacks, protocols, and security measures. A must-read for enthusiasts and professionals.

Size: 2.31 MB Downloads: 431

Fundamentals of Cryptology

Description: Explore the fundamentals of cryptology, from classical ciphers to modern encryption techniques. Learn key concepts, practical applications, and essential terminology.

Size: 2.35 MB Downloads: 1,934

Handbook of Applied Cryptography

Description: Explore essential cryptography concepts, algorithms, and applications from the Handbook of Applied Cryptography. Perfect for students and professionals seeking in-depth knowledge.

Size: 5.95 MB Downloads: 1,559

Security Vulnerabilities of Mobile Devices

Description: Discover key strategies for mobile device security, including malware protection, app sandboxing, and secure communications.

Size: 407.9 KB Downloads: 10,166

Filtering Out Spam

Description: Discover essential concepts in computer and network security, including regular expressions and email filtering techniques.

Size: 304.56 KB Downloads: 2,762

Bots, Botnets, and the DDoS Attacks

Description: Explore the world of bots and botnets, their command structures, and DDoS attacks in this comprehensive guide to network security.

Size: 372.23 KB Downloads: 5,165

Malware: Viruses and Worms

Description: Explore the anatomy of computer viruses and worms with practical examples in Perl and Python. Enhance your cybersecurity knowledge today!

Size: 376.36 KB Downloads: 6,750

Attacks for Cyber Espionage with Trojans

Description: Explore how ransomware and trojans operate, their attack vectors, and prevention strategies in this comprehensive overview of cyber threats.

Size: 372.56 KB Downloads: 3,448

Web Security: Cross-Site Scripting and Other Browser-Side Exploits

Description: Explore the fundamentals of web security, including cookies, XSS attacks, and how to protect against vulnerabilities in web applications.

Size: 253.79 KB Downloads: 2,914

Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack

Description: Explore web security basics with a focus on PHP exploits, SQL injection, and Slowloris attack. Learn to protect your web servers effectively.

Size: 418.92 KB Downloads: 4,279

The Dictionary and the Rainbow-Table Attack

Description: Explore dictionary and rainbow table attacks on password security, learn defense methods, and understand password hashing techniques in detail.

Size: 285.87 KB Downloads: 2,014

Port and Vulnerability Scanning

Description: Learn essential concepts of Ethernet frames, port & vulnerability scanning, packet sniffing, and intrusion detection from this comprehensive computer security.

Size: 289.74 KB Downloads: 2,010

Buffer Overflow Attack

Description: Learn key concepts and defenses of buffer overflow attacks with case studies on telnet service vulnerabilities for computer security professionals.

Size: 283.73 KB Downloads: 1,121

Finite Fields (PART 4) - Finite Fields of the Form GF(2n)

Description: Explore finite fields GF(2ⁿ) with bitwise arithmetic, multiplication rules, and applications in cryptography. Learn from Avi Kak's Computer & Network Security

Size: 179.46 KB Downloads: 543

Finite Fields (PART 3) - Polynomial Arithmetic

Description: Explore polynomial arithmetic over finite fields with practical examples, key concepts, and applications in cryptography from Avi Kak’s comprehensive lecture.

Size: 99.49 KB Downloads: 504

Finite Fields (PART 2) - Modular Arithmetic

Description: Explore key concepts of finite fields, modular arithmetic, and Euclid’s algorithm for GCD and multiplicative inverses in modern cryptography.

Size: 232.48 KB Downloads: 495

Finite Fields (PART 1) - Groups, Rings, and Fields

Description: Explore the fundamentals of finite fields and their crucial role in modern computer security and cryptographic algorithms. Master the math behind encryption.

Size: 135.44 KB Downloads: 1,148

DNS and the DNS Cache Poisoning Attack

Description: Learn DNS fundamentals and how DNS cache poisoning attacks work with expert insights from Avi Kak's comprehensive computer security lecture.

Size: 618.02 KB Downloads: 1,353

Hashing for Message Authentication

Description: Explore comprehensive insights into hashing for message authentication. Learn secure cryptographic hash functions, MACs, SHA family, and real-world applications

Size: 386.08 KB Downloads: 694