Practical Malware Analysis
Few areas of digital security seem as asymmetric as those involving malware, defensive tools, and operating systems. In the summer of 2011, I attended Peiter (Mudge) Zatko’s keynote at Black Hat in Las Vegas, Nevada. During his talk, Mudge introduced the asymmetric nature of modern software. He explained how he analyzed 9,000 malware binaries and counted an average of 125 lines of code (LOC) for his sample set.
جهت استعلام قیمت و سفارش چاپ این محصول لطفا با انتشارات گنج حضور تماس حاصل فرمایید