Module Name | Download | Description | Download Size |
---|---|---|---|
Prerequisites: Software Installation Guide | Experimental setup | Notes of Experimental setup | 407 |
Need for Secure Systems | Session 1 | Notes of Session 1 | 1841 |
Need for Secure Systems | Session 2 | Notes of Session 2 | 93 |
Need for Secure Systems | Session 3 | Notes of Session 3 | 100 |
Need for Secure Systems | Session 4 | Notes of Session 4 | 131 |
Need for Secure Systems | Session 5 | Notes of Session 5 | 100 |
Security and Architecture | Session 6 | Notes of Session 6 | 81 |
Security and Architecture | Session 7 | Notes of Session 7 | 87 |
Security and Architecture | Session 8 | Notes of Session 8 | 122 |
Security and Architecture | Session 9 | Notes of Session 9 | 85 |
Security and Architecture | Session 10 | Notes of Session 10 | 101 |
Features of X86 | Session 11 | Notes of Session 11 | 106 |
Features of X86 | Session 12 | Notes of Session 12 | 80 |
Features of X86 | Session 13 | Notes of Session 13 | 108 |
Features of X86 | Session 14 | Notes of Session 14 | 160 |
Memory Segmentation Deep dive | Session 15 | Notes of Session 15 | 115 |
Memory Segmentation Deep dive | Session 16 | Notes of Session 16 | 77 |
Sl.No | Chapter Name | English |
---|---|---|
1 | Experimental Setup: Video Tutorial | Download Verified |
2 | Need for Secure Systems | Download Verified |
3 | Ignorance of A is Sin of B | Download Verified |
4 | Function calls and Stacks | Download Verified |
5 | Stack Smashing | Download Verified |
6 | Virtual Machine Based Rootkits | Download Verified |
7 | Security and Architecture: Introduction | Download Verified |
8 | Structured Computer Organization Completed | Download Verified |
9 | X86 ISA Part1 | Download Verified |
10 | X86 ISA Part 2 | Download Verified |
11 | X86 Protected Mode | Download Verified |
12 | X86 Memory Segmentation | Download Verified |
13 | Process Isolation using Segmentation | Download Verified |
14 | Paging and Virtual Memory | Download Verified |
15 | Task Switching and Interrupt Service | Download Verified |
16 | Memory Segmentation Deep dive P1 | Download Verified |
17 | Memory Segmentation Deep dive P2 | Download Verified |
18 | Memory Segmentation Deep dive P3 - Week 4 | Download Verified |
19 | Memory Segmentation Deep dive P4 - Week 4 | Download Verified |
20 | Segmentation Recap - Week 4 | Download Verified |
21 | Lab1 Part 1 - Week 4 | Download Verified |
22 | Lab1 Part 2 - Week 4 | Download Verified |
23 | Lab 1 Part 3 - Week4 | Download Verified |
24 | ISR Recap - Week 5 | Download Verified |
25 | Lab2 Part 1 - Week 5 | Download Verified |
26 | Lab2 Part 2 - Week 5 | Download Verified |
27 | Memory Management Recap - Week 5 | Download Verified |
28 | Lab3 Part 1 - Week 5 | Download Verified |
29 | Lab3 Part 2 - Week 5 | Download Verified |
30 | Task Switch recap - Week 6 | Download Verified |
31 | Lab4 Part 1 - Week 6 | Download Verified |
32 | Lab4 Part 2 - Week 6 | Download Verified |
33 | Lab4 Part 3 - Week 6 | Download Verified |
34 | Lab4 Part 4 - Week 6 | Download Verified |
35 | Introduction to Basic Cryptography - Week7 | Download Verified |
36 | Public Key Cryptography - Week 7 | Download Verified |
37 | Freescale ARM iMX6 Processor- Week 7 | Download Verified |
38 | High Assurance Boot in iMX6 - Week 7 | Download Verified |
39 | Case Study - Week 7 | Download Verified |
40 | Basics of Networking - Week 8 | Download Verified |
41 | Network Processor Vs General Purpose Processor - Week 8 | Download Verified |
42 | Network Processor Architecture - Week 8 | Download Verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Download |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |