Cenas dos filmes:
. Hackers: https://www.youtube.com/watch?v=4U9MI0u2VIE
. Swordfish: https://www.youtube.com/watch?v=u1Ds9CeG-VY
. Good Will Hunting: https://www.youtube.com/watch?v=N7b0cLn-wHU
. Jurassic Park: https://www.youtube.com/watch?v=URVS4H7vrdU
. The Matrix Reloaded: https://www.youtube.com/watch?v=5h5XoZCHirc
. TRON: Legacy: https://www.youtube.com/watch?v=VO5qq1XN64M
. Independence Day: http://www.reelz.com/trailer-clips/44899/independence-day-clip/
. The Imitation Game: https://www.youtube.com/watch?v=MM47hsaYWZE
Outros links:
. Livros da cena do Hackers:
http://www.amazon.com/The-Peter-Norton-Programmers-Guide/dp/0914845462
http://www.amazon.com/Compilers-Principles-Techniques-Alfred-Aho/dp/0201100886/ref=sr_1_3?ie=UTF8&qid=1430789186&sr=8-3&keywords=compilers
http://www.amazon.com/Design-Implementation-Unix-Operating-System/dp/0201546299
. Vídeo explicando o problema do Good Will Hunting e todas as árvores:
https://www.youtube.com/watch?v=iW_LkYiuTKE
. Links sobre a vulnerabilidade (real) que Trinity explorou no Matrix: Reloaded e email do Fyodor (criador do nmap) sobre a reação dele ao ver a cena no filme:
http://www.securityfocus.com/news/4831
http://seclists.org/nmap-announce/2003/18
. Link do simulador web da máquina de Turing (já carregado com o programa para verificar se uma string binária é ou não palíndromo):