Book#
An ancient object that held information. Some have e-text available.
Software#
This page lists all projects using this programming language or deployment platform. Only the main server-side requirements, packaging or distribution formats are considered.
A Graduate Course in Applied Cryptography Book#
“Throughout the book we present many case studies to survey how deployed systems operate. We describe common mistakes to avoid as well as attacks on real-world systems that illustrate the importance of rigor in cryptography.”
By Dan Boneh and Victor Shoup.
Competitive Programmer’s Handbook#
“The purpose of this book is to give you a thorough introduction to competitive programming.”
By Antti Laaksonen.
Computer Systems Security: Planning For Success#
“The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security.”
By Ryan Tolboom.
Kurose/Ross Networking Book#
Material on understanding computer networks.
By Jim Kurose and Keith Ross.
Linux auditd for Threat Detection#
Blog post on configuring auditd on Linux systems.
OSINT Techniques Book#
“Resources for Uncovering Online Information”
By Michael Bazzell.