Cargando…

Identifying malicious code through reverse engineering

Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.

Detalles Bibliográficos
Autor principal: Singh, Abhishek
Lenguaje:eng
Publicado: Springer 2009
Materias:
XX
Acceso en línea:http://cds.cern.ch/record/2758145
Descripción
Sumario:Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.