Free Cyber Security PDF Library: From Basics to Advanced

Computer Security focuses on protecting systems and data from threats, covering cryptography, network security, ethical hacking, and cybersecurity best practices.

35 Courses
55,014 Total Downloads

Cyber Security for Beginners

Description: Learn the fundamentals of cyber security, master key terms, protect your data, and understand how to defend against online threats with this beginner-friendly guide.

Size: 6.09 MB Downloads: 5,735

Security of Ubiquitous Computing Systems

Description: Secure ubiquitous computing and IoT systems. Free PDF covers device vulnerabilities, network threats, and protection strategies for pervasive computing.

Size: 2.31 MB Downloads: 431

Fundamentals of Cryptology

Description: Explore the fundamentals of cryptology, from classical ciphers to modern encryption techniques. Learn key concepts, practical applications, and essential terminology.

Size: 2.35 MB Downloads: 1,934

Handbook of Applied Cryptography

Description: Explore essential cryptography concepts, algorithms, and applications from the Handbook of Applied Cryptography. Perfect for students and professionals seeking in-depth knowledge.

Size: 5.95 MB Downloads: 1,559

Security Vulnerabilities of Mobile Devices

Description: Identify and mitigate mobile device vulnerabilities. Free PDF covers Android and iOS security best practices.

Size: 407.9 KB Downloads: 10,165

Filtering Out Spam

Description: Discover essential concepts in computer and network security, including regular expressions and email filtering techniques.

Size: 304.56 KB Downloads: 2,762

Bots, Botnets, and the DDoS Attacks

Description: Explore the world of bots and botnets, their command structures, and DDoS attacks in this comprehensive guide to network security.

Size: 372.23 KB Downloads: 5,164

Malware: Viruses and Worms

Description: Explore the anatomy of computer viruses and worms with practical examples in Perl and Python. Enhance your cybersecurity knowledge today!

Size: 376.36 KB Downloads: 6,749

Attacks for Cyber Espionage with Trojans

Description: Explore how ransomware and trojans operate, their attack vectors, and prevention strategies in this comprehensive overview of cyber threats.

Size: 372.56 KB Downloads: 3,447

Web Security: Cross-Site Scripting and Other Browser-Side Exploits

Description: Explore the fundamentals of web security, including cookies, XSS attacks, and how to protect against vulnerabilities in web applications.

Size: 253.79 KB Downloads: 2,912

Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack

Description: Explore web security basics with a focus on PHP exploits, SQL injection, and Slowloris attack. Learn to protect your web servers effectively.

Size: 418.92 KB Downloads: 4,278

The Dictionary and the Rainbow-Table Attack

Description: Explore dictionary and rainbow table attacks on password security, learn defense methods, and understand password hashing techniques in detail.

Size: 285.87 KB Downloads: 2,013

Port and Vulnerability Scanning

Description: Learn essential concepts of Ethernet frames, port & vulnerability scanning, packet sniffing, and intrusion detection from this comprehensive computer security.

Size: 289.74 KB Downloads: 2,007

Buffer Overflow Attack

Description: Learn key concepts and defenses of buffer overflow attacks with case studies on telnet service vulnerabilities for computer security professionals.

Size: 283.73 KB Downloads: 1,121

Finite Fields (PART 4) - Finite Fields of the Form GF(2n)

Description: Explore finite fields GF(2ⁿ) with bitwise arithmetic, multiplication rules, and applications in cryptography. Learn from Avi Kak's Computer & Network Security

Size: 179.46 KB Downloads: 543

Finite Fields (PART 3) - Polynomial Arithmetic

Description: Explore polynomial arithmetic over finite fields with practical examples, key concepts, and applications in cryptography from Avi Kak’s comprehensive lecture.

Size: 99.49 KB Downloads: 504

Finite Fields (PART 2) - Modular Arithmetic

Description: Explore key concepts of finite fields, modular arithmetic, and Euclid’s algorithm for GCD and multiplicative inverses in modern cryptography.

Size: 232.48 KB Downloads: 495

Finite Fields (PART 1) - Groups, Rings, and Fields

Description: Explore the fundamentals of finite fields and their crucial role in modern computer security and cryptographic algorithms. Master the math behind encryption.

Size: 135.44 KB Downloads: 1,148

DNS and the DNS Cache Poisoning Attack

Description: Learn DNS fundamentals and how DNS cache poisoning attacks work with expert insights from Avi Kak's comprehensive computer security lecture.

Size: 618.02 KB Downloads: 1,353

Hashing for Message Authentication

Description: Explore comprehensive insights into hashing for message authentication. Learn secure cryptographic hash functions, MACs, SHA family, and real-world applications

Size: 386.08 KB Downloads: 694