Cargando…

Identifying malicious code through reverse engineering

Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.

Detalles Bibliográficos
Autor principal: Singh, Abhishek
Lenguaje:eng
Publicado: Springer 2009
Materias:
XX
Acceso en línea:http://cds.cern.ch/record/2758145
_version_ 1780970096760455168
author Singh, Abhishek
author_facet Singh, Abhishek
author_sort Singh, Abhishek
collection CERN
description Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.
id cern-2758145
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2009
publisher Springer
record_format invenio
spelling cern-27581452021-04-21T16:40:38Zhttp://cds.cern.ch/record/2758145engSingh, AbhishekIdentifying malicious code through reverse engineeringXXMany attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.Springeroai:cds.cern.ch:27581452009
spellingShingle XX
Singh, Abhishek
Identifying malicious code through reverse engineering
title Identifying malicious code through reverse engineering
title_full Identifying malicious code through reverse engineering
title_fullStr Identifying malicious code through reverse engineering
title_full_unstemmed Identifying malicious code through reverse engineering
title_short Identifying malicious code through reverse engineering
title_sort identifying malicious code through reverse engineering
topic XX
url http://cds.cern.ch/record/2758145
work_keys_str_mv AT singhabhishek identifyingmaliciouscodethroughreverseengineering