obfuscation
1Web Application Obfuscation , Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay (2011)
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create… 4363 руб2Practical Reverse Engineering. x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation , Elias Bachaalany
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or… 3860.83 руб электронная книга3Eichmann before Jerusalem: The Unexamined Life of a Mass Murderer , Bettina Stangneth (2015)
Smuggled out of Europe after the collapse of Germany, Eichmann managed to live a peaceful and active life of exile in Argentina for years before his capture by the Mossad. Though once widely known as… 1237 руб