Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
Computer Security
Introduction
Security Principles
1. Security Principles
Memory Safety
2. x86 Assembly and Call Stack
3. Memory Safety Vulnerabilities
4. Mitigating Memory-Safety Vulnerabilities
Cryptography
5. Introduction to Cryptography
6. Symmetric-Key Cryptography
7. Cryptographic Hashes
8. Message Authentication Codes (MACs)
9. Pseudorandom Number Generators
10. Diffie-Hellman Key Exchange
11. Public-Key Encryption
12. Digital Signatures
13. Certificates
14. Passwords
15. Case Studies
16. Bitcoin
Web Security
17. SQL Injection
18. Introduction to the Web
19. Same-Origin Policy
20. Cookies and Session Management
21. Cross-Site Request Forgery (CSRF)
22. Cross-Site Scripting (XSS)
23. UI Attacks
24. CAPTCHAs
Network Security
25. Introduction to Networking
26. ARP
27. DHCP
28. WPA
29. BGP
30. TCP and UDP
31. TLS
32. DNS
33. DNSSEC
34. Denial-of-Service (DoS)
35. Firewalls
36. Intrusion Detection
37. Abusing Intrusion Detection
38. Malware
39. Anonymity and Tor
Glossary
CS 161
Dark Mode
Cryptography
15. Case Studies
Case Studies
Case Studies
TODO: Under construction.