Computer security tutorials

Download free pdf courses and tutorials on (computer security, network security and extended local wifi, cracking and hacking) courses materials and training. 

Home computer security

Download free pdf Home computer security course material and training.

home-computer-securityYour home computer security is a popular target for intruders. Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can fi nd. By stealing that information, intruders can use your money to buy themselves goods and services.


Level :
Size : 180 Ko
File type : PDF
Pages : 38
Author : This pamphlet was designed and written by Lawrence R. Rogers
( It was edited by Linda Hutz Pesante
( The graphic design and illustrations were created
by David Biber ( All work in the Networked
Systems Survivability Program at Carnegie Mellon University’s Software
Engineering Institute in Pittsburgh, PA.

Contents Introduction Thinking About Securing Your Home Computer Things You Ought To Know What Should I Do To Secure My Home Computer? Summary End Notes Acknowledgements.
An Introduction to Computer Security

Download free pdf  An Introduction to Computer Security course material and

This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations.The handbook provides a broad overview of computer security to help readers understand their computer security needs and develop a sound approach to the selection of appropriate security controls. It does not describe detailed steps necessary to implement a computer security program, provide detailed implementation procedures for security controls, or give guidance for
auditing the security of specific systems. General references are provided at the end of this chapter, and references of “how-to” books and articles are provided at the end of each chapter in Parts II, III and IVThe purpose of this handbook is not to specify requirements but, rather, to discuss the benefits of various computer security controls and situations in which their application may be appropriate. Some requirements for federal systems are noted in the text. This document provides advice 2 and guidance; no penalties are stipulated.


Level :
Size : 1.63 Mo
File type : PDF
Pages : 290
Author : National Institute of Standards and Technology
Technology Administration

Table of Contents

  • Introduction and overview
    •  introduction
    •  elements of computer security
    •  roles and responsibilities
    •  common threats: a brief overview
  • Management controls
    •  computer security policy
    •  computer security program management
    •  computer security risk management
    •  security and planning in the computer system life cycle
    •  assurance
  • Operational controls
    •  personnel/user issues
    •  preparing for contingencies and disasters
    •  computer security incident handling
    •  awareness, training, and education
    •  security considerations in computer support and operations
    •  physical and environmental security
  • Technical controls
    •  identification and authentication
    •  logical access control
    •  audit trails
    •  cryptography
A course in Cryptography

Download free pdf  A course in Cryptography, ebook course material and training.a-course-in-cryptoghaphy

The word cryptography stems from the two Greek words kryptos´ and graphein ´ meaning “hidden” and “to write” respectively. Indeed, the most basic cryptographic problem, which dates back millenia, considers the task of using “hidden writing” to secure, or conceal communication between two parties.


Level :
Size : 1.68 Mo
File type : PDF
Pages : 204
Author : rafael pass
abhi shelat


  • Algorithms & Protocols
  • List of Major Definitions
  • Preface
  • Numbering and Notation
  • Introduction
  • Computational Hardness
  • Indistinguishability & Pseudo-Randomness
  • Knowledge
  • Authentication
  • Computing on Secret Inputs
  • Composability
  • More on Randomness and Pseudorandomness
  • Bibliography
  • A Background Concepts
  • B Basic Complexity Classes
prev-best-course next-best-course