Home Videos Adoptions Get a Copy Author Chinese
videos, slides, problems, & labs
Software Security
01. Set-UID Programs Video-A:02 Slides Problems Lab
02. Environment Variables and Attacks Video-A:02 Slides Problems Lab
03. Shellshock Attack Video-A:03 Slides Problems Lab
04. Buffer Overflow Attack Video-A:04 Slides Problems Lab1, Lab2
05. Return-to-libc Attack and ROP Video-A:05 Slides Problems Lab
06. Format String Vulnerability Video-A:09 Slides Problems Lab
07. Race Condition Vulnerability Video-A:06 Slides Problems Lab
08. Dirty COW Video-A:07 Slides Problems Lab
09. Reverse Shell Video-B:06 Slides Problems -
Web Security
10. Cross-Site Request Forgery Attack Slides Problems Lab
11. Cross-Site Scripting Attack Slides Problems Lab
12. SQL Injection Attack Slides Problems Lab
Hardware Security
13. Meltdown Attack Video-A:08 Slides Problems Lab
14. Spectre Attack Video-A:08 Slides Problems Lab
Network Security
15. Packet Sniffing & Spoofing Video-B:02 Slides Problems Lab1, Lab2, Lab3
16. Attacks on the TCP Protocol Video-B:06 Slides Problems Lab1, Lab2
17. Firewall Video-B:09 Slides Problems Lab1, Lab2
18. DNS and Attacks Video-B:07 Slides Problems Lab1, Lab2, Lab3
19. Virtual Private Network Video-B:08 Slides Problems Lab1, Lab2
20. The Heartbleed Bug and Attack Video-B:11 Slides Problems Lab
Cryptography
21. Secret-Key Encryption Slides Problems Lab
22. One-Way Hash Function Slides Problems Lab1, Lab2
23. Public Key Cryptography Slides Problems Lab
24. Public Key Infrastructure Slides Problems Lab
25. Transport Layer Security Slides Problems Lab
26. Bitcoin and Blockchain Slides Problems -

Note to instructors: solutions to the problems will only be given to the instructors who have adopted the book as a required text (any version and any edition) in their courses. You can use your course syllabus as a proof.