Cargando…
Identifying malicious code through reverse engineering
Many attacks occur on computers through the internet because of vulnerable software. This book details information on reverse engineering to help target vulnerability in a software program. It includes case studies of the latest exploits.
Autor principal: | Singh, Abhishek |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2758145 |
Ejemplares similares
-
Malware: fighting malicious code
por: Skoudis, Ed, et al.
Publicado: (2004) -
Detecting and Combating Malicious Email
por: Ryan, Julie
Publicado: (2014) -
Malicious mobile code: virus protection for Windows
por: Grimes, Roger A
Publicado: (2001) -
Malware Forensics: Investigating and Analyzing Malicious Code
por: Aquilina, James M, et al.
Publicado: (2008) -
BERT-Based Approaches to Identifying Malicious URLs
por: Su, Ming-Yang, et al.
Publicado: (2023)