Cargando…
Identifying malicious code through reverse engineering
Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2758145 |
_version_ | 1780970096760455168 |
---|---|
author | Singh, Abhishek |
author_facet | Singh, Abhishek |
author_sort | Singh, Abhishek |
collection | CERN |
description | Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits. |
id | cern-2758145 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2009 |
publisher | Springer |
record_format | invenio |
spelling | cern-27581452021-04-21T16:40:38Zhttp://cds.cern.ch/record/2758145engSingh, AbhishekIdentifying malicious code through reverse engineeringXXMany attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.Springeroai:cds.cern.ch:27581452009 |
spellingShingle | XX Singh, Abhishek Identifying malicious code through reverse engineering |
title | Identifying malicious code through reverse engineering |
title_full | Identifying malicious code through reverse engineering |
title_fullStr | Identifying malicious code through reverse engineering |
title_full_unstemmed | Identifying malicious code through reverse engineering |
title_short | Identifying malicious code through reverse engineering |
title_sort | identifying malicious code through reverse engineering |
topic | XX |
url | http://cds.cern.ch/record/2758145 |
work_keys_str_mv | AT singhabhishek identifyingmaliciouscodethroughreverseengineering |