Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
sku: 2616329
$83.89
Shipping from: United Arab Emirates
   Description
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation By Dang, Bruce Published by WILEY Publication Date: 2014-04-11 Subject: Computers Computer Architecture, Computers Logic Design, Computers Security General, Computers Security Network Security, Computers Security - Network Security, Technology & Engineering Engineering (General), Computer Architecture & Logic Design, Computer Networking & Communications, Engineering: General, Computer Architecture And Logic Design, Hc Informatik, Edv Datenkommunikation, Netzwerke, Computing: Professional & Programming, Computers Security General, Computers, Security, General, Computers Security Network Security, Network Security, Computer Networking & Communications, Hc Informatik, Edv Datenkommunikation, Netzwerke, Hc, Informatik, Edv, Datenkommunikation, Netzwerke, Networking Security, Networking, Software Engineering Subject Keywords: reverse engineering; books on reverse engineering; how to reverse engineer software; reverse engineering and computers; how to reverse engineer systems; reverse engineering and hackers; book on reverse engineering; Practical Reverse Engineering; x86 x64 and ARM; windows kernel-mode code; windows kernel rookits and drivers; what is reverse engineering; reverse engineer software; reverse engineering tools; reverse engineering software; challenge of reverse engineering; define reverse engineering; examples of reverse engineering; reverse engineering definition; reverse engineering examples; reverse engineering malware; code reverse engineering; definition of reverse engineering; hardware reverse engineering; reverse engineering tutorials; malware reverse engineering; reverse engineering techniques; reverse engineering is, reverse engineering; books on reverse engineering; how to reverse engineer software; reverse engineering and computers; how to reverse engineer systems; reverse engineering and hackers; book on reverse engineering; Practical Reverse Engineering; x86 x64 and ARM; windows kernel-mode code; windows kernel rookits and drivers; what is reverse engineering; reverse engineer software; reverse engineering tools; reverse engineering software; challenge of reverse engineering; define reverse engineering; examples of reverse engineering; reverse engineering definition; reverse engineering examples; reverse engineering malware; code reverse engineering; definition of reverse engineering; hardware reverse engineering; reverse engineering tutorials; malware reverse engineering; reverse engineering techniques; reverse engineering is; reverse engineering; books on reverse engineering; how to reverse engineer software; reverse engineering and computers; how to reverse engineer systems; reverse engineering and hackers; book on reverse engineering; Practical Reverse Engineering; x86 x64 and ARM; windows kernel-mode code; windows kernel rookits and drivers;what is reverse engineering; reverse engineer software; reverse engineering tools; reverse engineering software; challenge of reverse engineering; define reverse engineering; examples of reverse engineering; reverse engineering definition; reverse engineering examples; reverse engineering malware; code reverse engineering; definition of reverse engineering; hardware reverse engineering; reverse engineering tutorials; malware reverse engineering; reverse engineering techniques; reverse engineering is Genre: Computers, Security, General, Computers, Security, Network Security, Computer Networking & Communications, Hc, Informatik, Edv, Datenkommunikation, Netzwerke Target Audience: A Read for the Modern Generation
   Price history chart & currency exchange rate

Customers also viewed