Additional Reading Materials

Cryptography

Control Hijacking Attacks

Web Security

OS Security

Exploiting Hardware Bugs

Mobile devices