Ebooks

Identifying Malicious Code Through Reverse Engineering (Malestrom)

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -


Torrent info

Name:Identifying Malicious Code Through Reverse Engineering (Malestrom)

Total Size: 6.23 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 1

Stream: Watch Online @ Movie4u

Last Updated: 2017-05-12 07:43:51 (Update Now)

Torrent added: 2009-08-25 19:26:05



VPN For Torrents

Torrent Files List


Identifying Malicious Code Through Reverse Engineering - (Malestrom).pdf (Size: 6.23 MB) (Files: 1)

 Identifying Malicious Code Through Reverse Engineering - (Malestrom).pdf

6.23 MB
 

tracker

leech seeds
 

Torrent description

http://www.image-upload.net/images/p13qkc92sss1llnzk3q.jpeg

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security): Abhishek Singh
Springer | ISBN: 0387098240 | April 10, 2009 | PDF (OCR) | 188 pages

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.

Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

related torrents

Torrent name

health leech seeds Size
 


comments (0)

Main Menu