Readings

DateTopic
01/28/11Buffer overflows
02/04/11Control hijacking
02/11/11Security requirements
02/18/11None (Milestone 1)
02/25/11Applied cryptography
03/04/11Applied cryptography
03/11/11None (Milestone 2)
03/18/11TLS
03/25/11Spring break
04/01/11Assurance
04/08/11None (Milestone 3)
04/15/11Assurance
04/22/11Web security
04/29/11None (Milestone 4)
05/06/11Web security

Buffer overflows

Control hijacking

Security requirements

Applied cryptography

Warning: the older a source is, the more likely it is to contain out-of-date information about current best practices in applied cryptography.

TLS (Transport Layer Security)

Assurance

Web security