Saltar al contenido
Library Home
Start Over
Research Databases
E-Journals
Reservas de Curso
Library Home
Entrar
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Lenguaje
Library Catalog
Todos los Campos
Título
Autor
Materia
Número de Clasificación
ISBN/ISSN
Buscar
Búsqueda Avanzada
|
Revisar
|
Consejos de búsqueda
Practical reverse engineering...
Citar
Describir
Enviar este por Correo electrónico
Imprimir
Exportar Registro
Exportar a RefWorks
Exportar a EndNoteWeb
Exportar a EndNote
Agregar a favoritos
Enlace Permanente
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation / Bruce Dang, Alexandre Gazet, Elias Bachaalany ; with contributions from Sébastien Josse.
Guardado en:
Detalles Bibliográficos
Autores principales:
Dang, Bruce
(Autor)
,
Gazet, Alexandre
(Autor)
,
Bachaalany, Elias
(Autor)
Otros Autores:
Josse, Sébastien
(Contribuidor)
Formato:
eBook
Lenguaje:
English
Publicado:
Indianapolis, IN :
Wiley,
[2014]
Materias:
Reverse engineering.
Computer security.
Disassemblers (Computer programs)
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Security
>
General.
Computer security
Reverse engineering
Acceso en línea:
Click for online access
Existencias
Descripción
Tabla de Contenidos
Ejemplares similares
Vista Equipo
Ejemplares similares
Reversing : secrets of reverse engineering
por: Eilam, Eldad
Publicado: (2005)
Reverse engineering
por: Bell, Walter
Publicado: (2007)
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
por: Foster, James C., et al.
Publicado: (2005)
The IDA Pro Book : the Unoffical Guide to the World's Most Popular Disassembler.
por: Eagle, Chris
Publicado: (2011)
Reverse Engineering : Technology of Reinvention.
por: Wang, Wego
Publicado: (2010)
Reversible computation : extending horizons of computing : selected results of the COST Action IC1405
Publicado: (2020)
Reversible computation : 14th international conference, RC 2022
Publicado: (2022)
Gray hat Python : Python programming for hackers and reverse engineers
por: Seitz, Justin
Publicado: (2009)
Reversible computation : 15th International Conference, RC 2023, Giessen, Germany, July 18-19, 2023, Proceedings
Publicado: (2023)
Reversible computation : 13th international conference, RC 2021, virtual event, July 7-8, 2021 : proceedings
Publicado: (2021)
Machine learning methods for reverse engineering of defective structured surfaces
por: Laube, Pascal
Publicado: (2020)
Nmap 6 : network exploration and security auditing Cookbook
por: Pale, Paulino Calderon
Publicado: (2012)
Black hat Python : Python programming for hackers and pentesters
por: Seitz, Justin
Publicado: (2014)
SQL injection attacks and defense
por: Clarke, Justin
Publicado: (2012)
Reversible computation : 12th International Conference, RC 2020, Oslo, Norway, July 9-10, 2020, Proceedings
Publicado: (2020)
Open source fuzzing tools.
por: Rathaus, Noam
Publicado: (2007)
Reverse Engineering in Control Design.
por: Alazard, Daniel
Publicado: (2013)
DevSecOps for .NET core : securing modern software applications
por: Zeeshan, Afzaal Ahmad
Publicado: (2020)
The tangled Web : a guide to securing modern Web applications
por: Zalewski, Michal
Publicado: (2012)
The web application hacker's handbook : finding and exploiting security flaws
por: Stuttard, Dafydd, 1972-
Publicado: (2011)
Aggressive network self-defense
por: Wyler, Neil R.
Publicado: (2005)
Part-themed issue on internet security
Publicado: (2006)
Special issue on internet security
Publicado: (2002)
Hack proofing Windows 2000
por: Todd, Chad
Publicado: (2001)
Reverse mathematics : problems, reductions, and proofs
por: Dzhafarov, Damir D.
Publicado: (2022)
Writing security tools and exploits
por: Foster, James C.
Publicado: (2006)
Security 2020 : reduce security risks this decade
por: Howard, Doug
Publicado: (2011)
Core software security : security at the source
por: Ransome, James F., et al.
Publicado: (2014)
Infosec management fundamentals
por: Dalziel, Henry
Publicado: (2015)
Chinese cybersecurity and defense
Publicado: (2014)
Network and security issues for internet mobile entertainment.
Publicado: (2004)
Web commerce security : design and development
por: Nahari, Hadi
Publicado: (2011)
Mobilizing the C-Suite Waging War Against Cyberattacks.
por: Riccardi, Frank
Publicado: (2022)
Mac Security Bible.
por: Kissell, Joe
Publicado: (2010)
The best damn firewall book period
Publicado: (2003)
Cisco security specialist's guide to PIX firewalls
por: Osipav, Vitaly
Publicado: (2002)
The misuse of information systems : the impact of security countermeasures
por: D'Arcy, John P., 1975-
Publicado: (2007)
Cisco security professional's guide to secure intrusion detection systems
Publicado: (2003)
Hack proofing your network
Publicado: (2002)
Official (ISC)2 guide to the ISSMP CBK
Publicado: (2011)
Anterior
Siguiente
Ejemplares similares
Reversing : secrets of reverse engineering
por: Eilam, Eldad
Publicado: (2005)
Reverse engineering
por: Bell, Walter
Publicado: (2007)
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
por: Foster, James C., et al.
Publicado: (2005)
The IDA Pro Book : the Unoffical Guide to the World's Most Popular Disassembler.
por: Eagle, Chris
Publicado: (2011)
Reverse Engineering : Technology of Reinvention.
por: Wang, Wego
Publicado: (2010)