• The Hacker Curriculum
  • Security Contests
    • MIT Lincoln Lab Capture the Flag Competition (Fall 2012)
    • MIT CTF Spring Fall 2012 meeting slides
    • MIT Lincoln Lab/CSAIL Capture the Flag Competition (Spring 2011)
      • (paper about the Spring '11 CTF)
    • UCSB International Capture the Flag (iCTF)
    • NYU Poly Cybersecurity Competitition
    • National Collegiate Cyber Defense Competition (CCDC)
  • Ethics
    • Computer Ethics Institute: Ten Commandments of Computer Ethics
    • Wellesley College's Policy on the Responsible Use of Information Technology
    • MIT's Policy on the Use of Information Technology
    • ACM Code of Ethics and Professional Conduct
  • Books/Articles
    • Ross Anderson's Security Engineering textbook.
    • Aleph One's Smashing the Stack for Fun and Profit
    • scut and team teso's Format String Vulnerabilities
  • General Security Info
    • Bruce Schneier's blog and Crypto-Gram newsletter
    • CERIAS
    • SANS Institute (newsletters, reading room)
    • SecurityFocus
    • Peter Neumann's Risks Digest
    • Princeton's Secure Internet Programming Lab
    • Freedom to Tinker blog
  • Vulnerabilities
    • Bugtraq (other Security Focus mailing lists)
    • CERT's Vulnerabilities and Fixes
    • SANS top 20 vulnerabilities
    • SANS Internet Storm Center
  • Some Security Courses Elsewhere
    • Olin: Ohack (Mark Chang)
    • MIT: 6.857 Computer and Network Security (Ron Rivest)
    • Dartmouth:
      • cs38 Security and Privacy (Sean Smith)
      • SISMAT Summer School (Mike Locasto and others)
    • University of Calgary:
      • CPSC 601.29: Information Systems Security Analysis (Mike Locasto)
      • CPSC 601.65: Cyberwar, Cyberterror, and Cyberprotest (Mike Locasto)
    • University of Washington: CSE 484 / CSE M 584: Computer Security (Tadayoshi Kohno)
    • Johns Hopkins University:
      • CS 600.443 Security and Privacy in Computing (Avi Rubin),
      • CS 600.643 Advanced Topics in Computer Security (Avi Rubin)
    • Kansas State University:
      • CIS 798 Cybersecurity (Anindya Banerjee)
      • CIS 890 Language Based Security (Torben Amtoft and Anindya Banerjee)
    • UC Davis:
      • ECS 153 Computer Security (Matt Bishop),
      • CS235 Computer and Information Security (Matt Bishop),
      • ECS 289M Foundations in Computer and Information Security (Matt Bishop)
      • COSMOS 2012 Cluster 4: Computer Security, Privacy, & Cybervillainy (Matt Bishop)
      • FRS 001-010: E-Voting and Elections (Matt Bishop)
      • ECS 155 Computer Security for Non-Majors (Matt Bishop)
    • UCSD: CSE207 Introduction to Modern Cryptography (Mihir Bellare and Phillip Rogaway)
  • Electronic Voting
    • Ben Adida's blog
    • Adida and Neff's Ballot Casting Assurance paper.
  • Cryptography
    • Introduction to Modern Cryptography, by Mihir Bellare and Phillip Rogaway (UCSD course CSE207)
    • Handbook of Applied Cryptography, by Alfred Menezes, Paul van Oorschot, and Scott Vanstone
    • Cryptography Applets
  • Linux
    • Linux, X, Emacs, and Java (for CS230, but valuable for CS235 as well)
    • A up-to-date list of all CS Dept. Linux machines
    • Mike Locasto's 1K Linux Commands
    • Scott Anderson's Wellesley local Unix Introduction
    • Larry Greenfield's The Linux Users' Guide
    • Linux Documentation Project
  • Emacs
    • Scott Anderson's Wellesley local Emacs Introduction
    • Emacs reference card
    • U Chicago Tutorial
    • GNU Emacs Manual
  • Programming
    • Scott's C/C++ for Java programmers
  • Intel x86 Instruction Set
    • Intel Instruction Set Summary (2 pages)
    • Intel x86 Instruction Reference
    • Paul Carter's PC Assembly Language Book
  • Privacy
    • Lawrence Lessig's The Architecture of Privacy
    • Betsy Masiello's Privacy Implications of Surveillance: The Destruction of Anonymity
  • Useful Software
    • VMWare Player
    • Knoppix STD