Identifying Malicious Code Through Reverse Engineering 비슷한 책 더 보기

Writing Security Tools and Exploits (Enhanced Edition) Writing Security Tools and Exploits (Enhanced Edition)
2006년
Dive Into Systems Dive Into Systems
2022년
Practical Reverse Engineering Practical Reverse Engineering
2014년
Buffer Overflow Attacks Buffer Overflow Attacks
2005년
ARM System Developer's Guide ARM System Developer's Guide
2004년
Understanding the Linux Kernel Understanding the Linux Kernel
2005년
The Shellcoder's Handbook The Shellcoder's Handbook
2011년
Reversing Reversing
2011년
The IDA Pro Book, 2nd Edition The IDA Pro Book, 2nd Edition
2008년
Practical Binary Analysis Practical Binary Analysis
2018년
Assembly Language Programming Assembly Language Programming
2013년
Advanced Mac OS X Programming Advanced Mac OS X Programming
2011년
Secure Coding in C and C++ Secure Coding in C and C++
2013년
Power and Performance Power and Performance
2015년
Guide to Assembly Language Programming in Linux Guide to Assembly Language Programming in Linux
2005년