Cybersecurity Books


High Performance Privacy Preserving AI

Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many more - there is therefore tension between unleashing the power of AI and maintaining the confidentiality and security of the relevant data. This book - intended for researchers in academia and R&D engineers in industry - explains how

What Is eBPF?

SRE Linux

In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, o

Cyber Security Awareness For Dummies

Over the past decade, the cyber security landscape has changed dramatically. According to Cybersecurity Ventures, by 2021, the global cost of cybercrime is expected to reach $6 trillion, making it more profitable than the entire global illegal drugs trade. Organisations of every size and in every industry have become potential targets for cybercrim

NGINX Cookbook, Part 2

Nginx

This is the 2nd of three installments of NGINX Cookbook. This book is about NGINX the web server, reverse proxy, load balancer, and HTTP cache. This installment focuses on security aspects and features of NGINX and NGINX Plus, the licensed version of the NGINX server. Throughout this installment the reader will learn the basics of controlling acces

Distributed Denial of Service (DDoS)

DDoS

Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to combat them has been slow to emerge. This ebook provides engineers and IT managers wi

Unmanned Aircraft Systems in the Cyber Domain, 2nd Edition

Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This open book will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly eme

Security of Ubiquitous Computing Systems

Cryptography

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and softwa

Password

Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the digital age if not the unauthorized use of a password? In untangling the histories, cultural contexts and philosophies of the password, Martin Paul Eve

The Joy of Cryptography

Cryptography

This book is not a handbook that specifies which cryptographic algorithm to use in every situation, nor is it a guide for securely implementing production-ready cryptographic libraries. The authors do not discuss specific cryptographic software, such as PGP, Tor, Signal, or TrueCrypt, nor do they cover cryptocurrencies like Bitcoin. Readers will no

Practical Cryptography for Developers

Cryptography

A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption,