- DokumenWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endsdiunggah olehWhite909
- DokumenProgramming with GNU Softwarediunggah olehWhite909
- DokumenMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialdiunggah olehWhite909
- DokumenGNU Linear Programming Kitdiunggah olehWhite909
- DokumenEssentials of Adobe Flashdiunggah olehWhite909
- DokumenSimon Josefsson- GNU Generic Security Service Librarydiunggah olehWhite909
- DokumenRay Toal- Ajax Programmingdiunggah olehWhite909
- DokumenJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectiondiunggah olehWhite909
- DokumenGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHunterdiunggah olehWhite909
- DokumenManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologydiunggah olehWhite909
- DokumenKernel-Land Rootkitsdiunggah olehWhite909
- DokumenAlexander Kornbrust- Oracle Rootkits 2.0diunggah olehWhite909
- DokumenAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?diunggah olehWhite909
- DokumenAndreas Bunten- UNIX and Linux based Kernel Rootkitsdiunggah olehWhite909
- DokumenJem Berkes- Topics in Network Securitydiunggah olehWhite909
- DokumenHallvar Helleseth- Wi-Fi Securitydiunggah olehWhite909
- DokumenPietro Cenciarelli- Computational applications of calculi based on monadsdiunggah olehWhite909
- DokumenGraham Williams- Debian GNU/Linuxdiunggah olehWhite909
- DokumenSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptiondiunggah olehWhite909
- DokumenReverend Bill Blunden- The Rootkit Arsenaldiunggah olehWhite909
- DokumenChris Ries- Inside Windows Rootkitsdiunggah olehWhite909
- DokumenDouglas P. Medley- Virtualization Technology Applied to Rootkit Defensediunggah olehWhite909
- DokumenJohn Heasman- Firmware Rootkitsdiunggah olehWhite909
- DokumenWangYao- Rootkit on Linux x86diunggah olehWhite909
- DokumenSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirtdiunggah olehWhite909
- DokumenChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationdiunggah olehWhite909
- DokumenJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?diunggah olehWhite909
- DokumenJoanna Rutkowska- Security Challenges in Virtualized Environmentsdiunggah olehWhite909
- DokumenGreg Morrisett- The Engineering Challenges of Trustworthy Computingdiunggah olehWhite909
- DokumenGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debuggingdiunggah olehWhite909
- DokumenProceedings of the Workshop on Binary Instrumentation and Applications 2009diunggah olehWhite909
- DokumenZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attackdiunggah olehWhite909
- DokumenAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionsdiunggah olehWhite909
- DokumenCollin Mulliner- Fuzzing the Phone in your Phonediunggah olehWhite909
- DokumenRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programmingdiunggah olehWhite909
- DokumenF-Secure Linux Securitydiunggah olehWhite909
- DokumenDoug Tidwell- Tutorialdiunggah olehWhite909