您的位置:首页 > 其它

病毒分析技术学习资料

2009-03-02 20:36 696 查看
从以下地址下载最全面权威的吧。
http://www.tml.hut.fi/Opinnot/T-110.6220/2008/T-110.6220_Windows_OS.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/Symbian_malware_and_spyware.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/T-110.6220-Antivirus_engine_design.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/T-110.6220-Assignment.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/T-110.6220_Debuggers.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/T-110.6220_Emulators_and_disassemblers.pdf http://www.tml.tkk.fi/Opinnot/T-110.6220/2008/T-110.6220_introduction.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/T-110.6220_Unpacking_and_decrypting_malware.pdf http://www.tml.tkk.fi/Opinnot/T-110.6120/2008/slides/tkk_hypponen.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/Erdelyi-Reverse_engineering_II.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/Erdelyi-Introduction_to_Reverse_Engineering.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/Erdelyi-Reverse_engineering_III.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/Erdelyi-Introduction_to_Malware.pdf http://www.tml.hut.fi/Opinnot/T-110.6220/2008/IDA_Pro_Shortcuts.pdf
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: