Reading material for those registered for this course, and want to get a flavor of the topics to be covered. Please note that most of the articles in the given links are superficial but can provide you with some idea about what kind of issues and concerns are going to be discussed and covered in this course. Please try to read them before you start this course. If you find difficulty in understanding the discussions at these links, you probably need to brush up your operating systems, computer organization, networking material you might have studied as an undergraduate student.

Buffer Overflow Example:

http://www.theprohack.com/2010/09/buffer-overflow-attack-tutorial-by.html

http://www.hackingtutorials.org/exploit-tutorials/buffer-overflow-explained-basics/

https://www.youtube.com/watch?v=4xLIw3MWNss

Unix Access Control and File System Permissions

https://en.wikipedia.org/wiki/File_system_permissions

https://www.tutorialspoint.com/unix/unix-file-permission.htm

Basic Ideas about Discretionary and Mandatory Access control

https://en.wikipedia.org/wiki/File_system_permissions

https://en.wikipedia.org/wiki/Mandatory_access_control

Securing Web Browser

https://www.us-cert.gov/publications/securing-your-web-browser

Securing Web Servers

https://www.cmu.edu/iso/governance/guidelines/web-server.html

http vs https

https://www.entrepreneur.com/article/281633

IPsec

http://www.firewall.cx/networking-topics/protocols/127-ip-security-protocol.html