Pointers
This is a curated list of links related to information security. To prevent link rot, resources are cached under the bracketed links. If this collection is useful to you, please contribute back by forwarding any quality resources to us.
Exercises
Core concepts
Cryptography
Computer security
Network security
Human factors
Books
Core concepts
Cryptography
- Cryptography engineering, ISBN 9780470474242
- Everyday cryptography, ISBN 9780199695591
Computer security
- Hacking: The art of exploitation, ISBN 9781593271442
- Computer security, ISBN 9780470741153
Network security
- Network security assessment, ISBN 9781491910955
- Thinking security, ISBN 9780134277547
Human factors
- Managing the human factor in information security, ISBN 9780470721995
- A practical guide to managing information security, ISBN 9781580537025
Technical track
Implementing security project
- Software security, ISBN 9780321356703
- Car hacker’s handbook, ISBN 9781593277031
- Abusing the Internet of Things, ISBN 9781491902332
Code audit project
- The art of software security assessment, ISBN 9780321444424
- A bug hunter’s diary, ISBN 9781593273859
Web app pentest project
- The Web application hacker’s handbook, ISBN 9781118026472
- The tangled Web, ISBN 9781593273880
Human track
Architecting security project
- Threat modeling, ISBN 9781118809990
- Designing connected products, ISBN 9781449372569
- Abusing the Internet of Things, ISBN 9781491902332
User study project
- Usable security: History, themes, and challenges, ISBN 9781627055291
- Just enough research, ISBN 9781937557102
- Rocket surgery made easy, ISBN 9780321657299
Phishing campaign project
- Social engineering in IT security, ISBN 9780071818469
- Influence: Science and practice, ISBN 9780205609994
Audit reports
Audit reports tend to be very different across the board. The ones listed here are mostly simple ones, as we think these are better examples for students than reports filled with chart junk. Also, in contrast to fundamental security research detailing security flaws, these audit reports provide an evaluation of security in context.
Cure53 - CaseBox (code audit) [PDF]
Cure53 - CaseBox (production) [PDF]
IOActive - Bromium vSentry [PDF]
iSEC - Security audit review [PDF]
Least Authority - Cryptocat [PDF]
Least Authority - GlobaLeaks [PDF]
Least Authority - SpiderOak Crypton [PDF]
Leviathan - OmniFileStore [PDF]
Leviathan - SpiderOak Crypton [PDF]
Matasano - NetApp MultiStore [PDF]
Matasano - Secure64 SourceT [PDF]
mnemonic - Norwegian electronic voting system [PDF]
NCC Group - Docker Notary [PDF]
Offensive Security - Sample report [PDF]
OPM-OIG - US Office of Personnel Management [PDF]
Princeton University - Diebold AccuVote-TS [PDF]
Princeton University - Safeplug [PDF]
PwC - HM Revenue and Customs [PDF]
Radboud University - Megamos Crypto [PDF]
Trail of Bits - Apple iOS 4 [PDF]
University of Michigan - Estonian I-voting system [PDF]