Cargando…

Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation

Detalles Bibliográficos
Autores principales: Dang, Bruce, Gazet, Alexandre, Bachaalany, Elias
Lenguaje:eng
Publicado: J. Wiley & Sons 2014
Materias:
Acceso en línea:http://cds.cern.ch/record/1697354
_version_ 1780936181729460224
author Dang, Bruce
Gazet, Alexandre
Bachaalany, Elias
author_facet Dang, Bruce
Gazet, Alexandre
Bachaalany, Elias
author_sort Dang, Bruce
collection CERN
id cern-1697354
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher J. Wiley & Sons
record_format invenio
spelling cern-16973542021-04-21T21:02:51Zhttp://cds.cern.ch/record/1697354engDang, BruceGazet, AlexandreBachaalany, EliasPractical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscationComputing and ComputersJ. Wiley & Sonsoai:cds.cern.ch:16973542014
spellingShingle Computing and Computers
Dang, Bruce
Gazet, Alexandre
Bachaalany, Elias
Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
title Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
title_full Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
title_fullStr Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
title_full_unstemmed Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
title_short Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
title_sort practical reverse engineering: x86, x64, arm, windows kernel, reversing tools, and obfuscation
topic Computing and Computers
url http://cds.cern.ch/record/1697354
work_keys_str_mv AT dangbruce practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation
AT gazetalexandre practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation
AT bachaalanyelias practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation