(This is a set, from the basic security of the network, to how hackers conduct information interception. It's quite full, and relatively shallow. It is suitable for entry, and it can make your roots wider.
п_簲____\1. Basics of Information Security--wjf.pdf
п_簲____\2. Hacker Attack and Defense Technology (Part 1)--wjf.pdf
п_簲____\3. Hacker Attack and Prevention Technology (Part 2)--wjf.pdf
п_簲____\4. Cryptography--wjf.pdf
п_簲_____\5. Identification--wjf.pdf
п_簲____\6. Network Security System Design--wjf.pdf
.....)