Léim chuig an ábhar
Library Home
Start Over
Research Databases
E-Journals
Áirithintí cúrsa
Library Home
Logáil isteach
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Teanga
Library Catalog
Gach réimse
Teideal
Údar
Ábhar
Gairmuimhir
ISBN/ISSN
AIMSIGH
Cuardach Casta
|
Brabhsáil
|
Leideanna cuardaigh
Practical reverse engineering...
Luaigh é seo
Seol mar théacs é seo
Seol é seo mar r-phost
Priontáil
Easpórtáil taifead
Easpórtáil chuig RefWorks
Easpórtáil chuig EndNoteWeb
Easpórtáil chuig EndNote
Cuir le mo chuid Ceanán
Buan-nasc
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation / Bruce Dang, Alexandre Gazet, Elias Bachaalany ; with contributions from Sébastien Josse.
Sábháilte in:
Sonraí bibleagrafaíochta
Príomhchruthaitheoirí:
Dang, Bruce
(Údar)
,
Gazet, Alexandre
(Údar)
,
Bachaalany, Elias
(Údar)
Rannpháirtithe:
Josse, Sébastien
(Rannpháirtí)
Formáid:
Ríomhleabhar
Teanga:
English
Foilsithe / Cruthaithe:
Indianapolis, IN :
Wiley,
[2014]
Ábhair:
Reverse engineering.
Computer security.
Disassemblers (Computer programs)
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Security
>
General.
Computer security
Reverse engineering
Rochtain ar líne:
Click for online access
Stoc
Cur síos
Clár na nÁbhar
Míreanna comhchosúla
Amharc foirne
Míreanna comhchosúla
Reversing : secrets of reverse engineering
de réir: Eilam, Eldad
Foilsithe / Cruthaithe: (2005)
Reverse engineering
de réir: Bell, Walter
Foilsithe / Cruthaithe: (2007)
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
de réir: Foster, James C., et al.
Foilsithe / Cruthaithe: (2005)
The IDA Pro Book : the Unoffical Guide to the World's Most Popular Disassembler.
de réir: Eagle, Chris
Foilsithe / Cruthaithe: (2011)
Reverse Engineering : Technology of Reinvention.
de réir: Wang, Wego
Foilsithe / Cruthaithe: (2010)
Reversible computation : extending horizons of computing : selected results of the COST Action IC1405
Foilsithe / Cruthaithe: (2020)
Reversible computation : 14th international conference, RC 2022
Foilsithe / Cruthaithe: (2022)
Gray hat Python : Python programming for hackers and reverse engineers
de réir: Seitz, Justin
Foilsithe / Cruthaithe: (2009)
Reversible computation : 15th International Conference, RC 2023, Giessen, Germany, July 18-19, 2023, Proceedings
Foilsithe / Cruthaithe: (2023)
Reversible computation : 13th international conference, RC 2021, virtual event, July 7-8, 2021 : proceedings
Foilsithe / Cruthaithe: (2021)
Machine learning methods for reverse engineering of defective structured surfaces
de réir: Laube, Pascal
Foilsithe / Cruthaithe: (2020)
Nmap 6 : network exploration and security auditing Cookbook
de réir: Pale, Paulino Calderon
Foilsithe / Cruthaithe: (2012)
Black hat Python : Python programming for hackers and pentesters
de réir: Seitz, Justin
Foilsithe / Cruthaithe: (2014)
SQL injection attacks and defense
de réir: Clarke, Justin
Foilsithe / Cruthaithe: (2012)
Reversible computation : 12th International Conference, RC 2020, Oslo, Norway, July 9-10, 2020, Proceedings
Foilsithe / Cruthaithe: (2020)
Open source fuzzing tools.
de réir: Rathaus, Noam
Foilsithe / Cruthaithe: (2007)
Reverse Engineering in Control Design.
de réir: Alazard, Daniel
Foilsithe / Cruthaithe: (2013)
DevSecOps for .NET core : securing modern software applications
de réir: Zeeshan, Afzaal Ahmad
Foilsithe / Cruthaithe: (2020)
The tangled Web : a guide to securing modern Web applications
de réir: Zalewski, Michal
Foilsithe / Cruthaithe: (2012)
The web application hacker's handbook : finding and exploiting security flaws
de réir: Stuttard, Dafydd, 1972-
Foilsithe / Cruthaithe: (2011)
Aggressive network self-defense
de réir: Wyler, Neil R.
Foilsithe / Cruthaithe: (2005)
Part-themed issue on internet security
Foilsithe / Cruthaithe: (2006)
Special issue on internet security
Foilsithe / Cruthaithe: (2002)
Hack proofing Windows 2000
de réir: Todd, Chad
Foilsithe / Cruthaithe: (2001)
Reverse mathematics : problems, reductions, and proofs
de réir: Dzhafarov, Damir D.
Foilsithe / Cruthaithe: (2022)
Writing security tools and exploits
de réir: Foster, James C.
Foilsithe / Cruthaithe: (2006)
Security 2020 : reduce security risks this decade
de réir: Howard, Doug
Foilsithe / Cruthaithe: (2011)
Core software security : security at the source
de réir: Ransome, James F., et al.
Foilsithe / Cruthaithe: (2014)
Infosec management fundamentals
de réir: Dalziel, Henry
Foilsithe / Cruthaithe: (2015)
Chinese cybersecurity and defense
Foilsithe / Cruthaithe: (2014)
Network and security issues for internet mobile entertainment.
Foilsithe / Cruthaithe: (2004)
Web commerce security : design and development
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Mobilizing the C-Suite Waging War Against Cyberattacks.
de réir: Riccardi, Frank
Foilsithe / Cruthaithe: (2022)
Mac Security Bible.
de réir: Kissell, Joe
Foilsithe / Cruthaithe: (2010)
The best damn firewall book period
Foilsithe / Cruthaithe: (2003)
Cisco security specialist's guide to PIX firewalls
de réir: Osipav, Vitaly
Foilsithe / Cruthaithe: (2002)
The misuse of information systems : the impact of security countermeasures
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
Cisco security professional's guide to secure intrusion detection systems
Foilsithe / Cruthaithe: (2003)
Hack proofing your network
Foilsithe / Cruthaithe: (2002)
Official (ISC)2 guide to the ISSMP CBK
Foilsithe / Cruthaithe: (2011)
Roimhe
Ar aghaidh
Míreanna comhchosúla
Reversing : secrets of reverse engineering
de réir: Eilam, Eldad
Foilsithe / Cruthaithe: (2005)
Reverse engineering
de réir: Bell, Walter
Foilsithe / Cruthaithe: (2007)
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
de réir: Foster, James C., et al.
Foilsithe / Cruthaithe: (2005)
The IDA Pro Book : the Unoffical Guide to the World's Most Popular Disassembler.
de réir: Eagle, Chris
Foilsithe / Cruthaithe: (2011)
Reverse Engineering : Technology of Reinvention.
de réir: Wang, Wego
Foilsithe / Cruthaithe: (2010)