| Software Reverse Engineering/0387098240 Identifying Malicious Code through Reverse Engineering [Singh & Singh 2009] {A0B137B5}.pdf |
5.6 MB |
| Software Reverse Engineering/0387402950 Reverse Engineering of Object Oriented Code [Tonella & Potrich 2005] {40B9D5E0}.pdf |
5.1 MB |
| Software Reverse Engineering/0672326388 Covert Java; Techniques for Decompiling, Patching, and Reverse Engineering [Kalinovsky 2004] {849B0279}.pdf |
3.8 MB |
| Software Reverse Engineering/0764574817 Reversing; Secrets of Reverse Engineering [Eilam 2005] {97BAB40F}.pdf |
8.2 MB |
| Software Reverse Engineering/0792397568 Reverse Engineering [Wills & Newcomb 1996] {C211BD02}.pdf |
9.7 MB |
| Software Reverse Engineering/1118787315 Practical Reverse Engineering; X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation [Dang, Gazet & Bachaalany 2014] {6E37555F}.pdf |
2.3 MB |
| Software Reverse Engineering/1119745306 ARM Assembly Internals & Reverse Engineering (Blue Fox ed.) [Markstedter 2023] {CA07D130}.pdf |
13.6 MB |
| Software Reverse Engineering/1439806306 Reverse Engineering; Technology of Reinvention [Wang 2011] {4AFBC9F1}.pdf |
8.5 MB |
| Software Reverse Engineering/1541176669 Penetration Testing and Reverse Engineering; Intrusion Detection Systems and e-Commerce Websites [Kowalski 2016] {78F49B34}.pdf |
1.2 MB |
| Software Reverse Engineering/1593270291 Hacking the Xbox; An Introduction to Reverse Engineering [Huang 2003] {F6D91301}.pdf |
7.2 MB |
| Software Reverse Engineering/1593271921 Gray Hat Python; Python Programming for Hackers and Reverse Engineers [Seitz 2009] {2C1E5D80}.pdf |
3 MB |
| Software Reverse Engineering/1597490059 Sockets, Shellcode, Porting & Coding; Reverse Engineering Exploits and Tool Coding for Security Professionals [Foster & Price 2005] {81863DDC}.pdf |
3.1 MB |
| Software Reverse Engineering/159749237X Reverse Engineering Code with IDA Pro [Kaminsky et al. 2008] {D87CA1C6}.pdf |
3.6 MB |
| Software Reverse Engineering/1615206493 Model-Driven Architecture for Reverse Engineering Technologies; Strategic Directions and System Evolution [Favre 2010] {7B7F5C0E}.pdf |
5.2 MB |
| Software Reverse Engineering/1718501021 The Ghidra Book; The Definitive Guide [Eagle & Nance 2020] {B20DD89D}.pdf |
17.2 MB |
| Software Reverse Engineering/178883884X Mastering Reverse Engineering [Wong 2018] {EF8730ED}.pdf |
14.2 MB |
| Software Reverse Engineering/1800207972 Ghidra Software Reverse Engineering for Beginners [David 2020] {B18A49EC}.pdf |
6.5 MB |
| Software Reverse Engineering/1801073392 Mobile App Reverse Engineering [Mishra 2022] {5CA7A230}.pdf |
17.3 MB |
| Software Reverse Engineering/184628855X Reverse Engineering; An Industrial Perspective [Raja & Fernandes 2008] {9C5F7E9B}.pdf |
3.5 MB |
| Software Reverse Engineering/1942878478 Advanced Apple Debugging & Reverse Engineering (2nd ed.) [Selander 2017] {029BDC95}.pdf |
64.8 MB |
| Software Reverse Engineering/1942878672 Advanced Apple Debugging & Reverse Engineering (3rd ed.) [Selander 2018] {B197C371}.pdf |
87.7 MB |
| Software Reverse Engineering/3031116259 Defending Cyber Systems through Reverse Engineering of Criminal Malware [Omar 2022] {607AFBD5}.pdf |
2.8 MB |
| Software Reverse Engineering/8189940163 Reverse Engineering [Bell 2007] {F06451E5}.pdf |
1.7 MB |
| Software Reverse Engineering/9391030378 Implementing Reverse Engineering [Narula 2022] {6EF8BFA0}.pdf |
30.7 MB |
| Software Reverse Engineering/9514448111 Static and Dynamic Reverse Engineering Techniques for Java Software Sysytems [Systä 2000] {52498508}.pdf |
1.1 MB |
| Software Reverse Engineering/9535101587 Reverse Engineering; Recent Advances and Applications [Telea 2012] {ADA0F03A}.pdf |
6.1 MB |