Identifying Malicious Code Through Reverse Engineering More Books Like This
Writing Security Tools and Exploits (Enhanced Edition)
2006
Dive Into Systems
2022
Practical Reverse Engineering
2014
Buffer Overflow Attacks
2005
ARM System Developer's Guide
2004
Understanding the Linux Kernel
2005
The Shellcoder's Handbook
2011
Reversing
2011
The IDA Pro Book, 2nd Edition
2008
Practical Binary Analysis
2018
Assembly Language Programming
2013
Power and Performance
2015
Guide to Assembly Language Programming in Linux
2005
Assembly x64 Programming in easy steps
2021
Mastering Assembly Programming
2017