Singh, Abhishek.

Identifying Malicious Code Through Reverse Engineering [electronic resource] / edited by Abhishek Singh. - Boston, MA : Springer US, 2009. - digital. - Advances in Information Security, 44 1568-2633 ; . - Advances in Information Security, 44 .

9780387894683

10.1007/978-0-387-89468-3 doi


Computer science.
Computer Communication Networks.
Data protection.
Data structures (Computer science).
Data encryption (Computer science).
Information systems.
Telecommunication.
Computer Science.
Data Structures, Cryptology and Information Theory.
Information Systems Applications (incl.Internet).
Data Encryption.
Communications Engineering, Networks.
Computer Communication Networks.
Systems and Data Security.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue