Relevant texts

There are no required textbooks for this course. However, the following are quite good, and I recommend them. They may be helpful for reinforcing concepts, practice problems, and delving deeper into some topics than we may go into in class.

  • Security in Computing, Pfleeger & Pfleeger, 4th ed.
  • Introduction to Computer Security, Goodrich & Tamassia, 1st ed.
  • Gray Hat Hacking: The Ethical Hacker's Guidebook, Harper et al., 3rd ed. (free online)
  • Security Engineering, Anderson, 2nd ed. (free online)

GDB references

GDB will be your friend in this course and in the future.

Virtual machine software

We will be using virtual machines for each project:

  • Download VM (3.6GB)
  • Username: cmsc414
  • Password: cmsc414

There are several good virtualization software packages; we recommend VirtualBox.

Note Recall that your project submission must work within the VM that we provide you. Be sure to test your code thoroughly in the VM provided.


Web Accessibility