Reference materials

Cryptography

Control hijacking attacks

Web security

OS security

Exploiting hardware bugs

Mobile devices