Version ebook / Retour
PART III
Advanced Malware Analysis
Chapter 20 Dissecting Android Malware
Chapter 21 Dissecting Ransomware
Chapter 22 Analyzing 64-bit Malware
Chapter 23 Next-Generation Reverse Engineering