Home
Random
Log in
Settings
Donations
About Wikibooks
Disclaimers
Search
Basic Computer Security/Further Reading
Language
Watch
Edit
<
Basic Computer Security
Computer security
— models
— software
Operating system —
Free security software
Security testing tools
— network
Internet security
Web security exploits
Cross-site scripting
Cyberattacks
Network analyzers
Computer access control
— exploits
Malware
Malware by type
Types of malware
Ransomware
Injection exploits
Cryptographic attacks
Covert channel
Data security
Cryptography
Cryptographic hash functions
Broken cryptography algorithms
Symmetric-key algorithm
Session key
Public-key cryptography
(Asymmetric key encryption)
Public key infrastructure
Diffie–Hellman key exchange
Public-key encryption schemes
Naccache–Stern knapsack cryptosystem
RSA
Cryptographic protocols
Encryption
Stream cipher
Block ciphers
Advanced Encryption Standard
Data security
Mobile security
Cybercrime
Hacking
Vulnerability
Social engineering
Humor
Evil bit
Further reading
https://security.stackexchange.com
Books
Hacking tools
S in The Computer Revolution
Courses
https://www.udemy.com/topic/cyber-security/
https://www.futurelearn.com/subjects/it-and-computer-science-courses/cyber-security
https://www.coursera.org/browse/information-technology/security