Listing 1 - 10 of 87 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hacke
Choose an application
Choose an application
Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes.
Choose an application
Choose an application
The Working Conference, held in Baltimore, May 1993, was created as a research-oriented forum on the theory and technology of recovering information from existing software and systems. The contributed papers address topics in issues and approaches, identifying components, tools, program understanding, challenges, database, user interfaces, dealing with legacy systems, dynamic analysis and testing, and transformation. No index. Acidic paper. Annotation copyright by Book News, Inc., Portland, OR.
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 87 | << page >> |
Sort by
|