Bilginin Adresi Ana Sayfa
Forum Anasayfası Forum Anasayfası > Yaþama Dair > Elektronik Kitap & E-Book
  Aktif Konular Aktif Konular RSS - Identifying Malicious Code Through Reverse Engineering
  SSS SSS  Forumu Ara   Events   Kayıt Ol Kayıt Ol  GiriÅŸ GiriÅŸ

Identifying Malicious Code Through Reverse Engineering

 Yanıt Yaz Yanıt Yaz
Yazar
Mesaj
invertor Açılır Kutu Gör
Security Professional
Security Professional
Simge
Ýnventor

Kayıt Tarihi: 18-01-2008
Status: Aktif DeÄŸil
Points: 3365
Mesaj Seçenekleri Mesaj Seçenekleri   Thanks (0) Thanks(0)   Alıntı invertor Alıntı  Yanıt YazCevapla Mesajın Direkt Linki Konu: Identifying Malicious Code Through Reverse Engineering
    Gönderim Zamanı: 26-03-2009 Saat 00:56
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
 
 
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security): Abhishek Singh
Springer | ISBN: 0387098240 | April 10, 2009 | PDF (OCR) | 188 pages | 5668 KB
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies.

Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference.

 

 
Yukarı Dön
 Yanıt Yaz Yanıt Yaz

Forum Atla Forum İzinleri Açılır Kutu Gör



Bu Sayfa 0.172 Saniyede Yüklendi.