Basic Computer Security/Further Reading

Computer security
— models
— software
Operating system —
Free security software
Security testing tools
— network
Internet security
Web security exploits
Cross-site scripting
Cyberattacks
Network analyzers
Computer access control
— exploits
Malware
Malware by type
Types of malware
Ransomware
Injection exploits
Cryptographic attacks
Covert channel
Data security
Cryptography
Cryptographic hash functions
Broken cryptography algorithms
Symmetric-key algorithm
Session key
Public-key cryptography (Asymmetric key encryption)
Public key infrastructure
Diffie–Hellman key exchange
Public-key encryption schemes
Naccache–Stern knapsack cryptosystem
RSA
Cryptographic protocols
Encryption
Stream cipher
Block ciphers
Advanced Encryption Standard
Data security
Mobile security
Cybercrime
Hacking
Vulnerability
Social engineering
Humor
Evil bit


Further reading

https://security.stackexchange.com


Books

Hacking tools
S in The Computer Revolution


Courses

https://www.udemy.com/topic/cyber-security/
https://www.futurelearn.com/subjects/it-and-computer-science-courses/cyber-security
https://www.coursera.org/browse/information-technology/security
Category:Book:Basic Computer Security#Further%20Reading%20
Category:Book:Basic Computer Security