- DocumentoWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endscaricato daWhite909
- DocumentoProgramming with GNU Softwarecaricato daWhite909
- DocumentoMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialcaricato daWhite909
- DocumentoGNU Linear Programming Kitcaricato daWhite909
- DocumentoEssentials of Adobe Flashcaricato daWhite909
- DocumentoSimon Josefsson- GNU Generic Security Service Librarycaricato daWhite909
- DocumentoRay Toal- Ajax Programmingcaricato daWhite909
- DocumentoJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectioncaricato daWhite909
- DocumentoGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHuntercaricato daWhite909
- DocumentoManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologycaricato daWhite909
- DocumentoKernel-Land Rootkitscaricato daWhite909
- DocumentoAlexander Kornbrust- Oracle Rootkits 2.0caricato daWhite909
- DocumentoAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?caricato daWhite909
- DocumentoAndreas Bunten- UNIX and Linux based Kernel Rootkitscaricato daWhite909
- DocumentoJem Berkes- Topics in Network Securitycaricato daWhite909
- DocumentoHallvar Helleseth- Wi-Fi Securitycaricato daWhite909
- DocumentoPietro Cenciarelli- Computational applications of calculi based on monadscaricato daWhite909
- DocumentoGraham Williams- Debian GNU/Linuxcaricato daWhite909
- DocumentoSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptioncaricato daWhite909
- DocumentoReverend Bill Blunden- The Rootkit Arsenalcaricato daWhite909
- DocumentoChris Ries- Inside Windows Rootkitscaricato daWhite909
- DocumentoDouglas P. Medley- Virtualization Technology Applied to Rootkit Defensecaricato daWhite909
- DocumentoJohn Heasman- Firmware Rootkitscaricato daWhite909
- DocumentoWangYao- Rootkit on Linux x86caricato daWhite909
- DocumentoSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirtcaricato daWhite909
- DocumentoChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationcaricato daWhite909
- DocumentoJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?caricato daWhite909
- DocumentoJoanna Rutkowska- Security Challenges in Virtualized Environmentscaricato daWhite909
- DocumentoGreg Morrisett- The Engineering Challenges of Trustworthy Computingcaricato daWhite909
- DocumentoGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debuggingcaricato daWhite909
- DocumentoProceedings of the Workshop on Binary Instrumentation and Applications 2009caricato daWhite909
- DocumentoZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attackcaricato daWhite909
- DocumentoAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionscaricato daWhite909
- DocumentoCollin Mulliner- Fuzzing the Phone in your Phonecaricato daWhite909
- DocumentoRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programmingcaricato daWhite909
- DocumentoF-Secure Linux Securitycaricato daWhite909
- DocumentoDoug Tidwell- Tutorialcaricato daWhite909