Cargando…
Identifying malicious code through reverse engineering
Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2758145 |
Sumario: | Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits. |
---|