Free Cyber Security PDF Library: From Basics to Advanced

Computer Security focuses on protecting systems and data from threats, covering cryptography, network security, ethical hacking, and cybersecurity best practices.

36 Courses
55,388 Total Downloads

Ethical Hacking

Description: Download free Ethical Hacking PDF. Learn hacktivism, penetration testing, cyber-jihad forums, and legal cases. Perfect for cybersecurity students and beginners.

Size: 3.98 MB Downloads: 150

Cyber Security for Beginners

Description: Practical cybersecurity guide for beginners: actionable steps on passwords, phishing, encryption, devices, and basic policies for individuals and teams.

Size: 6.09 MB Downloads: 6,018

Security of Ubiquitous Computing Systems

Description: Explore essential research papers on cryptography, covering attacks, protocols, and security measures. A must-read for enthusiasts and professionals.

Size: 2.31 MB Downloads: 473

Fundamentals of Cryptology

Description: Download free Fundamentals of Cryptology PDF. Learn encryption methods, cryptographic algorithms, security protocols, and key management.

Size: 2.35 MB Downloads: 1,987

Handbook of Applied Cryptography

Description: Comprehensive overview of applied cryptography: algorithms, protocols, and implementation guidance for students and professionals seeking practical mastery.

Size: 5.95 MB Downloads: 1,593

Security Vulnerabilities of Mobile Devices

Description: Practical strategies to secure mobile devices from malware, sandbox escapes, OTA interception, side-channel and USB attacks, with hands-on mitigation guidance.

Size: 407.90 KB Downloads: 10,234

Filtering Out Spam

Description: Practical guide to filtering spam with Procmail and regular expressions—email recipes, string processing, Base64 and HTML handling, and hands-on projects.

Size: 304.56 KB Downloads: 2,791

Bots, Botnets, and the DDoS Attacks

Description: Explore the world of bots and botnets, their command structures, and DDoS attacks in this comprehensive guide to network security.

Size: 372.23 KB Downloads: 5,227

Malware: Viruses and Worms

Description: Explore the anatomy of computer viruses and worms with practical examples in Perl and Python. Enhance your cybersecurity knowledge today!

Size: 376.36 KB Downloads: 6,807

Attacks for Cyber Espionage with Trojans

Description: Explore how ransomware and trojans operate, their attack vectors, and prevention strategies in this comprehensive overview of cyber threats.

Size: 372.56 KB Downloads: 3,492

Web Security: Cross-Site Scripting and Other Browser-Side Exploits

Description: Explore the fundamentals of web security, including cookies, XSS attacks, and how to protect against vulnerabilities in web applications.

Size: 253.79 KB Downloads: 2,943

Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack

Description: Explore web security basics with a focus on PHP exploits, SQL injection, and Slowloris attack. Learn to protect your web servers effectively.

Size: 418.92 KB Downloads: 4,314

The Dictionary and the Rainbow-Table Attack

Description: Explore dictionary and rainbow table attacks on password security, learn defense methods, and understand password hashing techniques in detail.

Size: 285.87 KB Downloads: 2,036

Port and Vulnerability Scanning

Description: Learn essential concepts of Ethernet frames, port & vulnerability scanning, packet sniffing, and intrusion detection from this comprehensive computer security.

Size: 289.74 KB Downloads: 2,051

Buffer Overflow Attack

Description: Learn key concepts and defenses of buffer overflow attacks with case studies on telnet service vulnerabilities for computer security professionals.

Size: 283.73 KB Downloads: 1,151

Finite Fields (PART 4) - Finite Fields of the Form GF(2n)

Description: Practical guide to GF(2^n) arithmetic: bitwise addition, shift-and-XOR multiplication, modular polynomial reduction, inversion methods, and code examples.

Size: 179.46 KB Downloads: 555

Finite Fields (PART 3) - Polynomial Arithmetic

Description: Explore polynomial arithmetic over finite fields with practical examples, key concepts, and applications in cryptography from Avi Kak’s comprehensive lecture.

Size: 99.49 KB Downloads: 514

Finite Fields (PART 2) - Modular Arithmetic

Description: Download free Finite Fields - Modular Arithmetic PDF. Learn modular operations, multiplicative inverses, GCD calculations, and field properties.

Size: 232.48 KB Downloads: 505

Finite Fields (PART 1) - Groups, Rings, and Fields

Description: Explore the fundamentals of finite fields and their crucial role in modern computer security and cryptographic algorithms. Master the math behind encryption.

Size: 135.44 KB Downloads: 1,161

DNS and the DNS Cache Poisoning Attack

Description: Learn DNS fundamentals and how DNS cache poisoning attacks work with expert insights from Avi Kak's comprehensive computer security lecture.

Size: 618.02 KB Downloads: 1,386