Cyber Security Books

Cyber security has become an absolute necessity. No device should be connected to the Internet without securing it properly. Attackers often use malware and other cyber-attacks to infect a computer or steal sensitive data from users. It is crucial that we secure ourselves.

Here is a list of cyber security books written for students and professionals who want to gain an in-depth knowledge of cyber security.

  • The Design And Implementation Of DSA And ECDSA Using Python

    The Design And Implementation Of DSA And ECDSA Using Python

    Author: Amrita Mitra

    The book “The Design And Implementation Of DSA And ECDSA Using Python” discusses the design of the DSA and ECDSA algorithms. The book also discusses the underlying mathematics behind the DSA and ECDSA algorithms. It then discusses the implementation of the DSA and ECDSA algorithms using Python without using any Python library dedicated to them. More …

  • The Design And Implementation Of The Diffie-Hellman Key Exchange Algorithm Using Python

    The Design And Implementation Of The Diffie-Hellman Key Exchange Algorithm Using Python

    Author: Amrita Mitra

    The book “The Design And Implementation Of The Diffie-Hellman Key Exchange Algorithm Using Python” explains the design of the Diffie-Hellman Key Exchange algorithm and the Elliptic Curve Diffie-Hellman (ECDH) algorithm. It also explains the fundamental concepts of mathematics required to understand the said algorithms. It also explains how to implement the algorithms using Python without using any Python library dedicated to them. More …

  • The Design And Implementation Of RSA Using Python

    The Design And Implementation Of RSA Using Python

    Author: Amrita Mitra

    The book explains the design and implementation of RSA using Python. It first explains the underlying mathematics, without which understanding the design of RSA is difficult. It then explains the RSA key generation, encryption, decryption, and digital signature algorithms and discusses the implementation of these algorithms from scratch using Python. The book then explains how to use Python libraries for RSA encryption, decryption, and digital signatures. It also discusses various security concerns of RSA and how to address them. More …

  • Web Application Vulnerabilities And Prevention

    Web Application Vulnerabilities And Prevention

    Author: Amrita Mitra

    The book Web Application Vulnerabilities And Prevention is good for students or professionals who want to learn about web application security. The cyber security book explains different types of web application vulnerabilities and how these vulnerabilities make a web application vulnerable to cyber-attacks. It also explains various preventive measures that can be taken to prevent attackers from exploiting each of these vulnerabilities. The cyber security book is written in a simple and easy-to-understand manner, and it explains various web application attacks with several diagrams and illustrations so that the book can benefit all the readers. More …

  • Cryptography And Public Key Infrastructure

    Cryptography And Public Key Infrastructure

    Author: Amrita Mitra

    The cryptography book “Cryptography And Public Key Infrastructure” explains how symmetric key encryption, public-key encryption, cryptographic hashing, digital signature, and Public Key Infrastructure work. It also explains how different cryptographic algorithms like DES, AES, IDEA, A5/1, RC4, MD5, SHA, HMAC, etc. work and how different cryptographic algorithms are used in various secure network protocols like TLS, SSH, DNSSEC, SFTP, FTPS, etc. The cryptography book also explains cryptanalysis and various cryptographic attacks. This book is good for students or professionals who want an in-depth knowledge of cryptography. No prior experience in the cryptography field is required to read this book.  More …

  • A Guide To Cyber Security

    Phishing: Detection, Analysis And Prevention

    Author: Amrita Mitra

    The phishing book “Phishing: Detection, Analysis And Prevention” is good for readers who want to learn about preventing phishing and social engineering. The book explains what phishing is, the different types of phishing scams, and what techniques are commonly used by attackers in a phishing scam. The phishing book also analyses several phishing messages and shows the readers what techniques are used in those phishing messages to deceive a victim. It also explains how we can prevent various phishing scams. This cyber security book is also written in simple language and is easy to understand so that all readers can benefit from it. More …

  • A Guide To Cyber Security

    A Guide To Cyber Security, 2nd Edition

    Author: Amrita Mitra

    A Guide To Cyber Security is good for beginners who want to learn how various malware and cyber-attacks work, why attackers make such attacks, and how we can effectively prevent them. The cyber security book covers topics like different types of encryption, email security, phishing, different types of malware and how they work, ransomware, phishing, the security of mobile phones, the security of IoT, Blockchain, etc. This cyber security book is also written in simple language, and an easy-to-understand manner and the book explains all the topics with lots of diagrams and illustrations so that it can benefit all the readers. More …

About the Author

Ms. Amrita Mitra is an author and security researcher. Her areas of interest are cyber security, Artificial Intelligence, and mathematics. She is also an entrepreneur who spreads knowledge and awareness about cyber security and Artificial Intelligence through the website The Security Buddy.

 

Calculate the pseudoinverse of a matrix using Python

What is the pseudoinverse of a matrix? We know that if A is a square matrix with full rank, then A-1 is said to be the inverse of A if the following condition holds: $latex AA^{-1}=A^{-1}A=I $ The pseudoinverse or the Moore-Penrose inverse of a matrix is a...

Cholesky decomposition using Python

What is Cholesky decomposition? A square matrix A is said to have Cholesky decomposition if it can be written as a product of a lower triangular matrix and its conjugate transpose. $latex A=LL^{*} $ If all the entries of A are real numbers, then the conjugate...

Tensor Hadamard Product using Python

In one of our previous articles, we already discussed what the Hadamard product in linear algebra is. We discussed that if A and B are two matrices of size mxn, then the Hadamard product of A and B is another mxn matrix C such that: $latex H_{i,j}=A_{i,j} \times...

Perform tensor addition and subtraction using Python

We can use numpy nd-array to create a tensor in Python. We can use the following Python code to perform tensor addition and subtraction. import numpy A = numpy.random.randint(low=1, high=10, size=(3, 3, 3)) B = numpy.random.randint(low=1, high=10, size=(3, 3, 3)) C =...

How to create a tensor using Python?

What is a tensor? A tensor is a generalization of vectors and matrices. It is easily understood as a multidimensional array. For example, in machine learning, we can organize data in an m-way array and refer it as a data tensor. Data related to images, sounds, movies,...

How to combine NumPy arrays using horizontal stack?

We can use the hstack() function from the numpy module to combine two or more NumPy arrays horizontally. For example, we can use the following Python code to combine three NumPy arrays horizontally. import numpy A = numpy.array([[1, 2, 3], [4, 5, 6], [7, 8, 9]]) B =...

How to combine NumPy arrays using vertical stack?

Let’s say we have two or more NumPy arrays. We can combine these NumPy arrays vertically using the vstack() function from the numpy module. For example, we can use the following Python code to combine three NumPy arrays vertically. import numpy A = numpy.array([[1, 2,...

Singular Value Decomposition (SVD) using Python

What is Singular Value Decomposition (SVD)? Let A be an mxn rectangular matrix. Using Singular Value Decomposition (SVD), we can decompose the matrix A in the following way: $latex A_{m \times n}=U_{m \times m}S_{m \times n}V_{n \times n}^T $ Here, U is an mxm matrix....

Eigen decomposition of a square matrix using Python

Let A be a square matrix. Let’s say A has k eigenvalues λ1, λ2, ... λk. And the corresponding eigenvectors are X1, X2, ... Xk. $latex X_1=\begin{bmatrix} x_{11} \\ x_{21} \\ x_{31} \\ ... \\ x_{k1} \end{bmatrix} \\ X_2=\begin{bmatrix} x_{12} \\ x_{22} \\ x_{32} \\ ......

How to calculate eigenvalues and eigenvectors using Python?

In our previous article, we discussed what eigen values and eigenvectors of a square matrix are and how we can calculate the eigenvalues and eigenvectors of a square matrix mathematically. We discussed that if A is a square matrix, then $latex (A- \lambda I) \vec{u}=0...

Not a premium member yet?

Please follow the link below to buy The Security Buddy Premium Membership.

Featured Posts

Translate »