- Security Goals
- Secure Systems Design
- Secure Design Principles
- Exercises for Part 1
- Worms and Other Malware
- Buffer Overflows
- Client-State Manipulation
- SQL Injection
- Password Security
- Cross-Domain Security in Web Applications
- Exercises for Part 2
- Symmetric Key Cryptography
- Asymmetric Key Cryptography
- Key Management & Exchange
- MACs and Signatures
- Exercises for Part 3
Part 1
Part 2
Part 3
http://code.google.com/edu/submissions/daswani/index.html
No comments:
Post a Comment