Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
Introduction to Vulnerability Assessment
Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
Android Forensics and Security Testing
Introduction to Trusted Computing
The Life of Binaries
Rootkits: What They Are, and How to Find Them
Introduction to Software Exploits
Introduction to Software Reverse Engineering
Exploits 2: Exploitation in the Windows Environment
Reverse Engineering Malware