Identifying Malicious Code Through Reverse Engineering
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Singh, Abhishek. (Editor) |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2009.
|
Series: | Advances in Information Security,
44 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-0-387-89468-3 |
Similar Items
-
Communication systems principles using MATLAB /
by: Leis, John W.,
Published: (2018) -
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018) -
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Computer and communication engineering : first International Conference, ICCCE 2018, Guayaquil, Ecuador, October 25-27, 2018, proceedings /
Published: (2019) -
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019)