Series
This page turns the archive into guided reading paths. Categories and tags are still useful for browsing, but this page is for readers who want a recommended route through the strongest clusters on the site.
If you are new here, start with one cluster, follow its core path in order, and only then branch into the related tracks.
On this page
- Operating system
- Computer architecture
- Secure coding and cybersecurity
- Computer networking and internet protocol
Operating system
Understand how modern systems manage processes, threads, memory, synchronization, deadlocks, and virtual memory.
- Intended reader level: beginner to intermediate
- Recommended first post: Operating System(1-1): Interrupt, Oranizaion, Architecture
- Related clusters: Computer architecture, Computer networking and internet protocol
Core path
- Operating System(1-1): Interrupt, Oranizaion, Architecture
- Operating System(1-2): Operation, Resource Management, Virtualization
- Operating System(2-1): Service, Interface, System calls, Link/Loaders
- Operating System(2-2): Design, Implementation, Structure
- Operating System(3-1): Process Scheduling/Creation/Termination, IPC
- Operating System(3-2): Process
- Operating System(4-1): Multicore Programming, Multithreading, Pthread
- Operating System(4-2): Thread Pool
- Operating System(5-1): CPU Scheduling
- Operating System(5-2): Real-time Scheduling
- Operating System(5-3): Scheduling: Linux,Window
- Operating System(6-1): Critical section, peterson, Synchronization Hardware
- Operating System(6-2): Mutax lock, Semaphore
- Operating System(6-3): Monitors, Liveness
- Operating System(7-1): Synchronization Examples
- Operating System(7-2): Synchronization(Windows, Linux, POSIX)
- Operating System(8): Deadlocks
- Operating System(9-1): Main Memory - Contiguous Memory Allocation
- Operating System(9-2): Main Memory - Paging
- Operating System(9-3): Main Memory - Swapping
- Operating System(10-1): Virtual Memory, Demand Paging
- Operating System(10-2): Page Replacement
- Operating System(10-3): Allocation of Frame
Practice
Computer architecture
Learn how instructions, registers, memory, processors, pipelines, and caches fit together from a machine-level point of view.
- Intended reader level: beginner to intermediate
- Recommended first post: Chapter 1-1: MIPS
- Related clusters: Operating system, Computer networking and internet protocol
Core path
- Chapter 1-1: MIPS
- Chapter 1-2: MIPS(MAPS)
- Chapter 2-1: Memory Operands, R/I-type
- Chapter 2-2: MIPS Registers
- Chapter 3-1: Logical Operations
- Chapter 3-2: Logical Operations-EXERCISE
- Chapter 4-1: Program Counter(Stack)
- Chapter 4-2: PC Example
- Chapter 5-1: Memory, Word addressing
- Chapter 5-2: Word addressing Exercies
- Chapter 6-1: Processor(1-1)
- Chapter 6-2: Processor(1-2)
- Chapter 7-1: Processor(2-1)
- Chapter 7-2: Processor(2-2)
- Chapter 8-1: Processor(3-1)
- Chapter 9: Processor(4): Pipeline
- Chapter 10: Processor(5-1): Pipeline register
- Chapter 10: Processor(5-2): Pipeline register
- Chapter 10: Processor(5-3): Hazard
- Chapter 11: Exploiting Memory Hierarchy(1) - Cache
- Chapter 11: Exploiting Memory Hierarchy(2) - Direct Mapped Cache
- Chapter 11: Exploiting Memory Hierarchy(3) - Placement of Cache
- Chapter 11: Exploiting Memory Hierarchy(3-2) - cache for real world
Secure coding and cybersecurity
This cluster starts from secure development fundamentals, then moves through threat modeling, authentication, validation, input handling, and representative web-application vulnerabilities. The first few posts also serve as the conceptual security baseline for the rest of the track.
- Intended reader level: beginner to intermediate
- Recommended first post: Secure Coding(1-1) - SW개발보안 이해
- Related clusters: Computer networking and internet protocol, Operating system
Core path
- Secure Coding(1-1) - SW개발보안 이해
- Secure Coding(1-2) - SW개발보안 국내기준
- Secure Coding(1-3) - SW개발보안 국외기준
- Secure Coding(2-1) - SW개발보안 방법론
- Secure Coding(2-2) - 위협모델링 개요
- Secure Coding(2-3) - 위협모델링 실무 적용
- Secure Coding(3-1) - 실습 환경 구축 및 HTTP 구조 이해
- Secure Coding(3-2) - 실습 환경 구축 및 Spring Boot
- Secure Coding(4-1) - 정규식 기본 문법
- Secure Coding(4-2) - 정규식 활용(데이터 검증)
- Secure Coding(4-3) - 정규식 활용(입력값 필터링)
- Secure Coding(5-1) - 인증과 인가
- Secure Coding(5-2) - OAuth2
- Secure Coding(5-3) - JWT(JSON Web Token)
- Secure Coding(6-1) - ORM
- Secure Coding(6-2) - SQL Injection
- Secure Coding(6-3) - Command Injection
- Secure Coding(7-1) - 프론트엔드 데이터 처리
- Secure Coding(7-2) - XSS 진단 및 대응
Computer networking and internet protocol
Start with core networking concepts first, then branch into transport and network layers, and finally move into the protocol-focused deep dive.
- Intended reader level: beginner to intermediate
- Recommended first post: Computer Networking(1): Intro
- Related clusters: Operating system, Secure coding and cybersecurity
Networking fundamentals
- Computer Networking(1): Intro
- Computer Networking: Application layer(1) - soket, HTTP, cache
- Computer Networking - Application layer(2): DNS, P2P
- Computer Networking - Transport layer(1): Multi/Demulti, UDP
- Computer Networking - Transport layer(2): rdt
- Computer Networking - Transport layer(3): TCP segment, retransmittion
- Computer Networking - Transport layer(4): TCP flow control, handshake
- Computer Networking - Transport layer(5): TCP congestion control
- Computer Networking - Network layer(1)
Internet protocol deep dive
- Internet Protocol(1) - ARP
- Internet Protocol(2) - IP Addressing
- Internet Protocol(3) - IP Header & Forwarding
- ICMP - Internet Control Message Protocol
- UDP - User Datagram Protocol
- TCP - Transmission Control Protocol
- DHCP - Dynamic Host Configuration Protocol
How to use this page
If you are starting from scratch, pick one cluster and follow the first 5-10 posts in order. If you already know the fundamentals, use the subtracks to jump into practice, protocol detail, or secure development topics without losing the larger map.