Bilginin Adresi Homepage
Forum Home Forum Home > Yaşama Dair > Elektronik Kitap & E-Book
  New Posts New Posts
  FAQ FAQ  Forum Search   Register Register  Login Login

REKLAM ALANI

El dokuma Konya Kilim, Kayseri Kilim, Antik Milas Halı, Antik Yörük Kilim, Hint Kilim

Konya Kilimleri Kayseri Kimleri Yörük İran ve Antika Kilimler Hint Kilimleri

Yeni ve 2. El İnşaat Yapı Malzemeleri

Masa iskele, Beton Paspayı, Kalıpaltı iskele, Güvenlikli iskele

Fayer İnşaat Ergenekon İnşaat


Identifying Malicious Code Through Reverse Engineering

 Post Reply Post Reply
Author
Message
invertor View Drop Down
Security Professional
Security Professional
Avatar
İnventor

Joined: 18-01-2008
Status: Offline
Points: 3332
Post Options Post Options   Thanks (0) Thanks(0)   Quote invertor Quote  Post ReplyReply Direct Link To This Post Topic: Identifying Malicious Code Through Reverse Engineering
    Posted: 26-03-2009 at 00:56
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
 
 
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security): Abhishek Singh
Springer | ISBN: 0387098240 | April 10, 2009 | PDF (OCR) | 188 pages | 5668 KB
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.

Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

 

 
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down



This page was generated in 0.062 seconds.