Series

This page turns the archive into guided reading paths. Categories and tags are still useful for browsing, but this page is for readers who want a recommended route through the strongest clusters on the site.

If you are new here, start with one cluster, follow its core path in order, and only then branch into the related tracks.

On this page

Operating system

Understand how modern systems manage processes, threads, memory, synchronization, deadlocks, and virtual memory.

Core path

  1. Operating System(1-1): Interrupt, Oranizaion, Architecture
  2. Operating System(1-2): Operation, Resource Management, Virtualization
  3. Operating System(2-1): Service, Interface, System calls, Link/Loaders
  4. Operating System(2-2): Design, Implementation, Structure
  5. Operating System(3-1): Process Scheduling/Creation/Termination, IPC
  6. Operating System(3-2): Process
  7. Operating System(4-1): Multicore Programming, Multithreading, Pthread
  8. Operating System(4-2): Thread Pool
  9. Operating System(5-1): CPU Scheduling
  10. Operating System(5-2): Real-time Scheduling
  11. Operating System(5-3): Scheduling: Linux,Window
  12. Operating System(6-1): Critical section, peterson, Synchronization Hardware
  13. Operating System(6-2): Mutax lock, Semaphore
  14. Operating System(6-3): Monitors, Liveness
  15. Operating System(7-1): Synchronization Examples
  16. Operating System(7-2): Synchronization(Windows, Linux, POSIX)
  17. Operating System(8): Deadlocks
  18. Operating System(9-1): Main Memory - Contiguous Memory Allocation
  19. Operating System(9-2): Main Memory - Paging
  20. Operating System(9-3): Main Memory - Swapping
  21. Operating System(10-1): Virtual Memory, Demand Paging
  22. Operating System(10-2): Page Replacement
  23. Operating System(10-3): Allocation of Frame

Practice

Computer architecture

Learn how instructions, registers, memory, processors, pipelines, and caches fit together from a machine-level point of view.

Core path

  1. Chapter 1-1: MIPS
  2. Chapter 1-2: MIPS(MAPS)
  3. Chapter 2-1: Memory Operands, R/I-type
  4. Chapter 2-2: MIPS Registers
  5. Chapter 3-1: Logical Operations
  6. Chapter 3-2: Logical Operations-EXERCISE
  7. Chapter 4-1: Program Counter(Stack)
  8. Chapter 4-2: PC Example
  9. Chapter 5-1: Memory, Word addressing
  10. Chapter 5-2: Word addressing Exercies
  11. Chapter 6-1: Processor(1-1)
  12. Chapter 6-2: Processor(1-2)
  13. Chapter 7-1: Processor(2-1)
  14. Chapter 7-2: Processor(2-2)
  15. Chapter 8-1: Processor(3-1)
  16. Chapter 9: Processor(4): Pipeline
  17. Chapter 10: Processor(5-1): Pipeline register
  18. Chapter 10: Processor(5-2): Pipeline register
  19. Chapter 10: Processor(5-3): Hazard
  20. Chapter 11: Exploiting Memory Hierarchy(1) - Cache
  21. Chapter 11: Exploiting Memory Hierarchy(2) - Direct Mapped Cache
  22. Chapter 11: Exploiting Memory Hierarchy(3) - Placement of Cache
  23. Chapter 11: Exploiting Memory Hierarchy(3-2) - cache for real world

Secure coding and cybersecurity

This cluster starts from secure development fundamentals, then moves through threat modeling, authentication, validation, input handling, and representative web-application vulnerabilities. The first few posts also serve as the conceptual security baseline for the rest of the track.

Core path

  1. Secure Coding(1-1) - SW개발보안 이해
  2. Secure Coding(1-2) - SW개발보안 국내기준
  3. Secure Coding(1-3) - SW개발보안 국외기준
  4. Secure Coding(2-1) - SW개발보안 방법론
  5. Secure Coding(2-2) - 위협모델링 개요
  6. Secure Coding(2-3) - 위협모델링 실무 적용
  7. Secure Coding(3-1) - 실습 환경 구축 및 HTTP 구조 이해
  8. Secure Coding(3-2) - 실습 환경 구축 및 Spring Boot
  9. Secure Coding(4-1) - 정규식 기본 문법
  10. Secure Coding(4-2) - 정규식 활용(데이터 검증)
  11. Secure Coding(4-3) - 정규식 활용(입력값 필터링)
  12. Secure Coding(5-1) - 인증과 인가
  13. Secure Coding(5-2) - OAuth2
  14. Secure Coding(5-3) - JWT(JSON Web Token)
  15. Secure Coding(6-1) - ORM
  16. Secure Coding(6-2) - SQL Injection
  17. Secure Coding(6-3) - Command Injection
  18. Secure Coding(7-1) - 프론트엔드 데이터 처리
  19. Secure Coding(7-2) - XSS 진단 및 대응

Computer networking and internet protocol

Start with core networking concepts first, then branch into transport and network layers, and finally move into the protocol-focused deep dive.

Networking fundamentals

  1. Computer Networking(1): Intro
  2. Computer Networking: Application layer(1) - soket, HTTP, cache
  3. Computer Networking - Application layer(2): DNS, P2P
  4. Computer Networking - Transport layer(1): Multi/Demulti, UDP
  5. Computer Networking - Transport layer(2): rdt
  6. Computer Networking - Transport layer(3): TCP segment, retransmittion
  7. Computer Networking - Transport layer(4): TCP flow control, handshake
  8. Computer Networking - Transport layer(5): TCP congestion control
  9. Computer Networking - Network layer(1)

Internet protocol deep dive

  1. Internet Protocol(1) - ARP
  2. Internet Protocol(2) - IP Addressing
  3. Internet Protocol(3) - IP Header & Forwarding
  4. ICMP - Internet Control Message Protocol
  5. UDP - User Datagram Protocol
  6. TCP - Transmission Control Protocol
  7. DHCP - Dynamic Host Configuration Protocol

How to use this page

If you are starting from scratch, pick one cluster and follow the first 5-10 posts in order. If you already know the fundamentals, use the subtracks to jump into practice, protocol detail, or secure development topics without losing the larger map.