"Identifying Malicious Code Through Reverse Engineering" - Information and Links:

Identifying Malicious Code Through Reverse Engineering - Info and Reading Options

Book's cover
The cover of “Identifying Malicious Code Through Reverse Engineering” - Open Library.

"Identifying Malicious Code Through Reverse Engineering" was published by Springer in 2009 - Boston, MA.


“Identifying Malicious Code Through Reverse Engineering” Metadata:

  • Title: ➤  Identifying Malicious Code Through Reverse Engineering
  • Author:
  • Publisher: Springer
  • Publish Date:
  • Publish Location: Boston, MA

“Identifying Malicious Code Through Reverse Engineering” Subjects and Themes:

Edition Identifiers:

AI-generated Review of “Identifying Malicious Code Through Reverse Engineering”:


"Identifying Malicious Code Through Reverse Engineering" Description:

Open Data:

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. Identifying Malicious Code through Reverse Engineering is designed for professionals composed of practitioners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference

Read “Identifying Malicious Code Through Reverse Engineering”:

Read “Identifying Malicious Code Through Reverse Engineering” by choosing from the options below.

Search for “Identifying Malicious Code Through Reverse Engineering” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “Identifying Malicious Code Through Reverse Engineering” in Libraries Near You:

Read or borrow “Identifying Malicious Code Through Reverse Engineering” from your local library.

Buy “Identifying Malicious Code Through Reverse Engineering” online:

Shop for “Identifying Malicious Code Through Reverse Engineering” on popular online marketplaces.