Cyber security has become an absolute necessity. No device should be connected to the Internet without securing it properly. Attackers often use malware and other cyber-attacks to infect a computer or steal sensitive data from users. It is crucial that we secure ourselves.

Here is a list of cyber security books written for students and professionals who want to gain an in-depth knowledge of cyber security.

### The Design And Implementation Of DSA And ECDSA Using Python

**Author:**Amrita MitraThe book “The Design And Implementation Of DSA And ECDSA Using Python” discusses the design of the DSA and ECDSA algorithms. The book also discusses the underlying mathematics behind the DSA and ECDSA algorithms. It then discusses the implementation of the DSA and ECDSA algorithms using Python without using any Python library dedicated to them. More …

### The Design And Implementation Of The Diffie-Hellman Key Exchange Algorithm Using Python

**Author:**Amrita MitraThe book “The Design And Implementation Of The Diffie-Hellman Key Exchange Algorithm Using Python” explains the design of the Diffie-Hellman Key Exchange algorithm and the Elliptic Curve Diffie-Hellman (ECDH) algorithm. It also explains the fundamental concepts of mathematics required to understand the said algorithms. It also explains how to implement the algorithms using Python without using any Python library dedicated to them. More …

### The Design And Implementation Of RSA Using Python

**Author:**Amrita MitraThe book explains the design and implementation of RSA using Python. It first explains the underlying mathematics, without which understanding the design of RSA is difficult. It then explains the RSA key generation, encryption, decryption, and digital signature algorithms and discusses the implementation of these algorithms from scratch using Python. The book then explains how to use Python libraries for RSA encryption, decryption, and digital signatures. It also discusses various security concerns of RSA and how to address them. More …

### Web Application Vulnerabilities And Prevention

**Author:**Amrita MitraThe book Web Application Vulnerabilities And Prevention is good for students or professionals who want to learn about web application security. The cyber security book explains different types of web application vulnerabilities and how these vulnerabilities make a web application vulnerable to cyber-attacks. It also explains various preventive measures that can be taken to prevent attackers from exploiting each of these vulnerabilities. The cyber security book is written in a simple and easy-to-understand manner, and it explains various web application attacks with several diagrams and illustrations so that the book can benefit all the readers. More …

### Cryptography And Public Key Infrastructure

**Author:**Amrita MitraThe cryptography book “Cryptography And Public Key Infrastructure” explains how symmetric key encryption, public-key encryption, cryptographic hashing, digital signature, and Public Key Infrastructure work. It also explains how different cryptographic algorithms like DES, AES, IDEA, A5/1, RC4, MD5, SHA, HMAC, etc. work and how different cryptographic algorithms are used in various secure network protocols like TLS, SSH, DNSSEC, SFTP, FTPS, etc. The cryptography book also explains cryptanalysis and various cryptographic attacks. This book is good for students or professionals who want an in-depth knowledge of cryptography. No prior experience in the cryptography field is required to read this book. More …

### Phishing: Detection, Analysis And Prevention

**Author:**Amrita MitraThe phishing book “Phishing: Detection, Analysis And Prevention” is good for readers who want to learn about preventing phishing and social engineering. The book explains what phishing is, the different types of phishing scams, and what techniques are commonly used by attackers in a phishing scam. The phishing book also analyses several phishing messages and shows the readers what techniques are used in those phishing messages to deceive a victim. It also explains how we can prevent various phishing scams. This cyber security book is also written in simple language and is easy to understand so that all readers can benefit from it. More …

### A Guide To Cyber Security, 2nd Edition

**Author:**Amrita MitraA Guide To Cyber Security is good for beginners who want to learn how various malware and cyber-attacks work, why attackers make such attacks, and how we can effectively prevent them. The cyber security book covers topics like different types of encryption, email security, phishing, different types of malware and how they work, ransomware, phishing, the security of mobile phones, the security of IoT, Blockchain, etc. This cyber security book is also written in simple language, and an easy-to-understand manner and the book explains all the topics with lots of diagrams and illustrations so that it can benefit all the readers. More …

### About the Author

Ms. Amrita Mitra is an author and security researcher. Her areas of interest are cyber security, Artificial Intelligence, and mathematics. She is also an entrepreneur who spreads knowledge and awareness about cyber security and Artificial Intelligence through the website The Security Buddy.