Free Cyber Security PDF Library: From Basics to Advanced
Computer Security focuses on protecting systems and data from threats, covering cryptography, network security, ethical hacking, and cybersecurity best practices.
Cyber Security for Beginners
Description: Learn the fundamentals of cyber security, master key terms, protect your data, and understand how to defend against online threats with this beginner-friendly guide.
Security of Ubiquitous Computing Systems
Description: Secure ubiquitous computing and IoT systems. Free PDF covers device vulnerabilities, network threats, and protection strategies for pervasive computing.
Fundamentals of Cryptology
Description: Explore the fundamentals of cryptology, from classical ciphers to modern encryption techniques. Learn key concepts, practical applications, and essential terminology.
Handbook of Applied Cryptography
Description: Explore essential cryptography concepts, algorithms, and applications from the Handbook of Applied Cryptography. Perfect for students and professionals seeking in-depth knowledge.
Security Vulnerabilities of Mobile Devices
Description: Identify and mitigate mobile device vulnerabilities. Free PDF covers Android and iOS security best practices.
Filtering Out Spam
Description: Discover essential concepts in computer and network security, including regular expressions and email filtering techniques.
Bots, Botnets, and the DDoS Attacks
Description: Explore the world of bots and botnets, their command structures, and DDoS attacks in this comprehensive guide to network security.
Malware: Viruses and Worms
Description: Explore the anatomy of computer viruses and worms with practical examples in Perl and Python. Enhance your cybersecurity knowledge today!
Attacks for Cyber Espionage with Trojans
Description: Explore how ransomware and trojans operate, their attack vectors, and prevention strategies in this comprehensive overview of cyber threats.
Web Security: Cross-Site Scripting and Other Browser-Side Exploits
Description: Explore the fundamentals of web security, including cookies, XSS attacks, and how to protect against vulnerabilities in web applications.
Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack
Description: Explore web security basics with a focus on PHP exploits, SQL injection, and Slowloris attack. Learn to protect your web servers effectively.
The Dictionary and the Rainbow-Table Attack
Description: Explore dictionary and rainbow table attacks on password security, learn defense methods, and understand password hashing techniques in detail.
Port and Vulnerability Scanning
Description: Learn essential concepts of Ethernet frames, port & vulnerability scanning, packet sniffing, and intrusion detection from this comprehensive computer security.
Buffer Overflow Attack
Description: Learn key concepts and defenses of buffer overflow attacks with case studies on telnet service vulnerabilities for computer security professionals.
Finite Fields (PART 4) - Finite Fields of the Form GF(2n)
Description: Explore finite fields GF(2ⁿ) with bitwise arithmetic, multiplication rules, and applications in cryptography. Learn from Avi Kak's Computer & Network Security
Finite Fields (PART 3) - Polynomial Arithmetic
Description: Explore polynomial arithmetic over finite fields with practical examples, key concepts, and applications in cryptography from Avi Kak’s comprehensive lecture.
Finite Fields (PART 2) - Modular Arithmetic
Description: Explore key concepts of finite fields, modular arithmetic, and Euclid’s algorithm for GCD and multiplicative inverses in modern cryptography.
Finite Fields (PART 1) - Groups, Rings, and Fields
Description: Explore the fundamentals of finite fields and their crucial role in modern computer security and cryptographic algorithms. Master the math behind encryption.
DNS and the DNS Cache Poisoning Attack
Description: Learn DNS fundamentals and how DNS cache poisoning attacks work with expert insights from Avi Kak's comprehensive computer security lecture.
Hashing for Message Authentication
Description: Explore comprehensive insights into hashing for message authentication. Learn secure cryptographic hash functions, MACs, SHA family, and real-world applications