Software Reverse Engineering

Torrent Hash:
26032AA4E512D43CF4182E277D96BE9705033349
Number of Files:
26
Content Size:
333.85MB
Convert On:
2023-11-06
Magnet Link:
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
File Name
Size
0387098240 Identifying Malicious Code through Reverse Engineering [Singh & Singh 2009] {A0B137B5}.pdf
5.65MB
0387402950 Reverse Engineering of Object Oriented Code [Tonella & Potrich 2005] {40B9D5E0}.pdf
5.1MB
0672326388 Covert Java; Techniques for Decompiling, Patching, and Reverse Engineering [Kalinovsky 2004] {849B0279}.pdf
3.85MB
0764574817 Reversing; Secrets of Reverse Engineering [Eilam 2005] {97BAB40F}.pdf
8.21MB
0792397568 Reverse Engineering [Wills & Newcomb 1996] {C211BD02}.pdf
9.7MB
1118787315 Practical Reverse Engineering; X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation [Dang, Gazet & Bachaalany 2014] {6E37555F}.pdf
2.28MB
1119745306 ARM Assembly Internals & Reverse Engineering (Blue Fox ed.) [Markstedter 2023] {CA07D130}.pdf
13.57MB
1439806306 Reverse Engineering; Technology of Reinvention [Wang 2011] {4AFBC9F1}.pdf
8.51MB
1541176669 Penetration Testing and Reverse Engineering; Intrusion Detection Systems and e-Commerce Websites [Kowalski 2016] {78F49B34}.pdf
1.22MB
1593270291 Hacking the Xbox; An Introduction to Reverse Engineering [Huang 2003] {F6D91301}.pdf
7.18MB
1593271921 Gray Hat Python; Python Programming for Hackers and Reverse Engineers [Seitz 2009] {2C1E5D80}.pdf
3.04MB
1597490059 Sockets, Shellcode, Porting & Coding; Reverse Engineering Exploits and Tool Coding for Security Professionals [Foster & Price 2005] {81863DDC}.pdf
3.11MB
159749237X Reverse Engineering Code with IDA Pro [Kaminsky et al. 2008] {D87CA1C6}.pdf
3.65MB
1615206493 Model-Driven Architecture for Reverse Engineering Technologies; Strategic Directions and System Evolution [Favre 2010] {7B7F5C0E}.pdf
5.2MB
1718501021 The Ghidra Book; The Definitive Guide [Eagle & Nance 2020] {B20DD89D}.pdf
17.23MB
178883884X Mastering Reverse Engineering [Wong 2018] {EF8730ED}.pdf
14.24MB
1800207972 Ghidra Software Reverse Engineering for Beginners [David 2020] {B18A49EC}.pdf
6.49MB
1801073392 Mobile App Reverse Engineering [Mishra 2022] {5CA7A230}.pdf
17.26MB
184628855X Reverse Engineering; An Industrial Perspective [Raja & Fernandes 2008] {9C5F7E9B}.pdf
3.51MB
1942878478 Advanced Apple Debugging & Reverse Engineering (2nd ed.) [Selander 2017] {029BDC95}.pdf
64.77MB
1942878672 Advanced Apple Debugging & Reverse Engineering (3rd ed.) [Selander 2018] {B197C371}.pdf
87.68MB
3031116259 Defending Cyber Systems through Reverse Engineering of Criminal Malware [Omar 2022] {607AFBD5}.pdf
2.83MB
8189940163 Reverse Engineering [Bell 2007] {F06451E5}.pdf
1.75MB
9391030378 Implementing Reverse Engineering [Narula 2022] {6EF8BFA0}.pdf
30.67MB
9514448111 Static and Dynamic Reverse Engineering Techniques for Java Software Sysytems [Systä 2000] {52498508}.pdf
1.12MB
9535101587 Reverse Engineering; Recent Advances and Applications [Telea 2012] {ADA0F03A}.pdf
6.07MB

Latest Search:

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