The links listed below are online documents, and enthusiasts who are interested in information security can serve as an introductory guide.
Background knowledge
General knowledge
Sun Certified-solaris 9&10 Security Administrator Learning Guide
PICOCTF Information
Application software Security
Code specification for owasp security Code
Vulnerability Mining
Windows ISV Software Security Defense
Mobile Security
OWASP Ten mobile phone security risks
Network security
General Network Attack type
Reverse engineering
University of Washington: Hardware/software interface
University of London: Malware and the underground industry--a slap doesn't ring
Web Security
OWASP Ten Web Application Security risks
Online Courses
Multi-disciplinary Courses
ISIS lab hacker Night
Related to source audit, web security, Reverse engineering, vulnerability mining, post-exploitation, application software security
Open Safety Training
Related to reverse engineering, leak mining, forensics technology, malicious software analysis
Florida State University: Security attacks
Related to source audit, application software Security, vulnerability mining, network security, web security, post-exploitation
Snow University seed: Developing computer safety education in teaching laboratories
Involving vulnerability mining, network security, web security
Stanford University: Computer security
Involving vulnerability mining, network security, mobile security, application software security, web security, malware analysis
Metasploit the blockbuster attack
Related to network security, application software security, vulnerability mining, post-exploitation
Cipher Science
Stanford University Cryptography Ⅰ
Stanford University Cryptography Ⅱ
Vulnerability utilization
Corelan Team article Collection
Reverse engineering
Dr. Thorsten Schneider: Binary code Audit
Lena's Tutorial: Malware analysis
Mammon_ ' s tales to his grandson
Program Analysis
Aachen University of Technology: Static program Analysis
MIT: SAT/SMT 2011 Summer University
Web Security
Penetrant Testing Laboratory
OWASP Application Security Series Tutorials
Online resources
Multi-disciplinary resources
ISIS Lab Wiki Resources
Blogs, subscriptions, guides, and links
Vulnhub
Application software Security
HP Fortify Taxonomy: Software Security Error
Application Software Safety Reading
Fuzzing
CTF Competition
CTF Competition
Wargames
Forgotten security ' s CTF Wiki
Ctftime
Embedded Device Security
Software personnel's Hardware hacker technology
Hacker method of embedded security device
Bobby Jack: The vulnerability mining of embedded system
Stephen Ridley: Hardware hacker video
Vulnerability Mining
Smashing the Stack for Fun and Profit
Introduction to return indicator programming (ROP)
A trip to the hole
Resource list for different vulnerabilities
Mobile Security
Automatic Hand attack Mobile heap
IG Beginners
OWASP igoat
OWASP goatdroid
Network security
OSI model
Nmap Network Scan
Security Project
ISIS Lab project Ideas
Reverse engineering
X86 Assembly
Web Security
Google Gruyere
Owasp of the Scapegoat plan
Damn vulnerable Web application (DVWA)
Recommended Books
Application Security
The art of software security assessment
Author: Mark Dowd, John McDonald, Justin Schuh
Diary of catching insects
Author: Tobias Klein
The discovery of mandatory security vulnerabilities in fuzzy testing
Author: Michael Sutton, Adam Greene, Pedram Amini
Vulnerability Mining
Hackers: The art of exploiting vulnerabilities | Hacking:the Art of exploitation
Author: Jon Erickson
Shellcoder notes: Discovering and using security flaws/The Shellcoder's handbook:discovering and exploiting secure holes
Author: Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
Network security
Hacker exposure: Network Security Secrets and Solutions (6th edition)
Author: Stuart McClure, Joel Scambray, George Kurtz
Reverse engineering
IDA Pro Authoritative Guide
Author: Chris Eagle
Reversing: The revelation of reverse engineering | Reversing:secrets of Reverse Engineering
Author: Eldad Eilam
Web Security
Hacker attack and defense technology treasure: Web actual Combat Article (2nd edition)
Author: Dafydd Stuttard, Marcus Pinto
Complex Web: A Security Guide to modern Web applications | The tangled web:a Guide to securing modern WEB applications
Author: Michal Zalewski