Relevant texts

There are no required textbooks for this course. However, the following are quite good, and I recommend them. They may be helpful for reinforcing concepts, practice problems, and delving deeper into some topics than we may go into in class.

  • Security in Computing, Pfleeger & Pfleeger, 4th ed.
  • Introduction to Computer Security, Goodrich & Tamassia, 1st ed.
  • Gray Hat Hacking: The Ethical Hacker's Guidebook, Harper et al., 3rd ed. (free online)
  • Security Engineering, Anderson, 2nd ed. (free online)

GDB references

GDB will be your friend in this course and in the future.

Virtual machine software

We will be using virtual machines for each project:

There are several good virtualization software packages; I recommend VirtualBox.

Important When you get the VM, please be sure to run "sudo apt install gcc-multilib" so that you can compile programs to 32-bit binaries.

Note Recall that your project submission must work within the VM that we provide you. Be sure to test your code thoroughly in the VM provided.


Web Accessibility