Identifying Malicious Code Through Reverse Engineering
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...
|Corporate Author:||SpringerLink (Online service)|
|Other Authors:||Singh, Abhishek.|
Boston, MA :
Advances in Information Security,
No Tags, Be the first to tag this record!