Identifying Malicious Code Through Reverse Engineering

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Singh, Abhishek.
Format: Electronic
Language: English
Published: Boston, MA : Springer US, 2009.
Series: Advances in Information Security, 44
Subjects:
Online Access: http://dx.doi.org/10.1007/978-0-387-89468-3
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
Your Comment