Table of ContentsA Crash Course in CISC & RISC Assembly and Basics of Computer ProgrammingBasic Static and Dynamic Analysis for x86/x64Unpacking, Decryption and DeobfuscationInspecting Process Injection & API HookingBypassing Anti-Reverse Engineering TechniquesUnderstanding Kernel-Mode & RootkitsHandling Exploits & ShellcodeReversing Bytecode Languages: DotNet, Java and MoreScripts & Macros: Reversing, Deobfuscation and DebuggingDissecting Linux and IoT MalwareIntro to MacOS and iOS ThreatsAnalyzing Android Malware Samples.
Note: Description based on CIP data; resource not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.