Identifying Malicious Code Through Reverse Engineering More Books Like This
Writing Security Tools and Exploits (Enhanced Edition)
2006
Dive Into Systems
2022
Implementing Reverse Engineering
2021
Practical Reverse Engineering
2014
Buffer Overflow Attacks
2005
ARM System Developer's Guide
2004
Understanding the Linux Kernel
2005
The Shellcoder's Handbook
2011
Reversing
2011
The IDA Pro Book, 2nd Edition
2008
Practical Binary Analysis
2018
Assembly Language Programming
2013
Advanced Mac OS X Programming
2011
Secure Coding in C and C++
2013
Power and Performance
2015