Instructor: | Mirela Damian, Mendel 167A |
---|---|
General: | Networking Glossary |
Cybersecurity Glossary | |
Open Web Application Security Project (OWASP) | |
Software: | Wireshark |
OWASP Zed Attack Proxy | |
OWASP WebGoat 5.2 | |
Damn Vulnerable Web Application | |
Security Videos: | Botnets Part I (15 mins) Part II (13 mins) Part III (13 mins) |
RxBot Source Code for Overachievers (14 mins) | |
Rootkits Part I (12 mins) Part II (9 mins) Part III (15 mins) | |
Drive-By Download (12 mins) | |
Session Hijacking Part I (3 mins) Part II (8 mins) | |
Clickjacking (38 mins) | |
Cross-Site Scripting (XSS) Part I (6 mins) Part II (6 mins) | |
Unix | Quick reference to basic unix commands |
Unix tutorial | |
Files and Directories in Unix | |
Summary of Emacs commands | |
Scripting | PhP Tutorial |
JavaScript Tutorial | |
Programming in C | Input and output in C |
A tutorial on pointers and arrays in C | |
Manipulating files in C | |
Learning C from Java differences | |
A 45 page summary of the C language from Stanford | |
A comprehensive wikipedia book on C programming | |
The C library reference guide | |
Check out cprogramming.com for everything C and C++ | |
Network programming with TCP sockets and POSIX threads | |
Multithreaded Echo application in C: readme echoapp.zip echoapp.tar | |
Programming in Java | Java API Specification |
Network programming with Java sockets and Java threads | |
Multithreaded Echo application in Java: readme echoJava.zip echoJava.tar |