Information Security Getting Started Guide

Source: Internet
Author: User
Tags hp fortify

The links listed below are online documents, and enthusiasts who are interested in information security can serve as an introductory guide.

Background knowledge

General knowledge

Sun Certified-solaris 9&10 Security Administrator Learning Guide

PICOCTF Information

Application software Security

Code specification for owasp security Code

Vulnerability Mining

Windows ISV Software Security Defense

Mobile Security

OWASP Ten mobile phone security risks

Network security

General Network Attack type

Reverse engineering

University of Washington: Hardware/software interface

University of London: Malware and the underground industry--a slap doesn't ring

Web Security

OWASP Ten Web Application Security risks

Online Courses

Multi-disciplinary Courses

ISIS lab hacker Night

Related to source audit, web security, Reverse engineering, vulnerability mining, post-exploitation, application software security

Open Safety Training

Related to reverse engineering, leak mining, forensics technology, malicious software analysis

Florida State University: Security attacks

Related to source audit, application software Security, vulnerability mining, network security, web security, post-exploitation

Snow University seed: Developing computer safety education in teaching laboratories

Involving vulnerability mining, network security, web security

Stanford University: Computer security

Involving vulnerability mining, network security, mobile security, application software security, web security, malware analysis

Metasploit the blockbuster attack

Related to network security, application software security, vulnerability mining, post-exploitation

Cipher Science

Stanford University Cryptography Ⅰ

Stanford University Cryptography Ⅱ

Vulnerability utilization

Corelan Team article Collection

Reverse engineering

Dr. Thorsten Schneider: Binary code Audit

Lena's Tutorial: Malware analysis

Mammon_ ' s tales to his grandson

Program Analysis

Aachen University of Technology: Static program Analysis

MIT: SAT/SMT 2011 Summer University

Web Security

Penetrant Testing Laboratory

OWASP Application Security Series Tutorials

Online resources

Multi-disciplinary resources

ISIS Lab Wiki Resources

Blogs, subscriptions, guides, and links

Vulnhub

Application software Security

HP Fortify Taxonomy: Software Security Error

Application Software Safety Reading

Fuzzing

CTF Competition

CTF Competition

Wargames

Forgotten security ' s CTF Wiki

Ctftime

Embedded Device Security

Software personnel's Hardware hacker technology

Hacker method of embedded security device

Bobby Jack: The vulnerability mining of embedded system

Stephen Ridley: Hardware hacker video

Vulnerability Mining

Smashing the Stack for Fun and Profit

Introduction to return indicator programming (ROP)

A trip to the hole

Resource list for different vulnerabilities

Mobile Security

Automatic Hand attack Mobile heap

IG Beginners

OWASP igoat

OWASP goatdroid

Network security

OSI model

Nmap Network Scan

Security Project

ISIS Lab project Ideas

Reverse engineering

X86 Assembly

Web Security

Google Gruyere

Owasp of the Scapegoat plan

Damn vulnerable Web application (DVWA)

Recommended Books

Application Security

The art of software security assessment

Author: Mark Dowd, John McDonald, Justin Schuh

Diary of catching insects

Author: Tobias Klein

The discovery of mandatory security vulnerabilities in fuzzy testing

Author: Michael Sutton, Adam Greene, Pedram Amini

Vulnerability Mining

Hackers: The art of exploiting vulnerabilities | Hacking:the Art of exploitation

Author: Jon Erickson

Shellcoder notes: Discovering and using security flaws/The Shellcoder's handbook:discovering and exploiting secure holes

Author: Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte

Network security

Hacker exposure: Network Security Secrets and Solutions (6th edition)

Author: Stuart McClure, Joel Scambray, George Kurtz

Reverse engineering

IDA Pro Authoritative Guide

Author: Chris Eagle

Reversing: The revelation of reverse engineering | Reversing:secrets of Reverse Engineering

Author: Eldad Eilam

Web Security

Hacker attack and defense technology treasure: Web actual Combat Article (2nd edition)

Author: Dafydd Stuttard, Marcus Pinto

Complex Web: A Security Guide to modern Web applications | The tangled web:a Guide to securing modern WEB applications

Author: Michal Zalewski

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.