×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of white909
GNU Linear Programming Kit: Reference Manual
153 views
Essentials of Adobe Flash
216 views
Manoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technology
267 views
Hallvar Helleseth- Wi-Fi Security: How to Break and Exploit
67 views
Graham Williams- Debian GNU/Linux: Desktop Survival Guide
337 views
John Heasman- Firmware Rootkits: The Threat to the Enterprise
116 views
F-Secure Linux Security
114 views
Greg Morrisett- The Engineering Challenges of Trustworthy Computing
14 views
Joanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?
321 views
WangYao- Rootkit on Linux x86
253 views
Chris Ries- Inside Windows Rootkits
284 views
Douglas P. Medley- Virtualization Technology Applied to Rootkit Defense
223 views
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirt: Implementing malware with virtual machines
223 views
Programming with GNU Software
234 views
Ray Toal- Ajax Programming
226 views
Simon Josefsson- GNU Generic Security Service Library
225 views
Joanna Rutkowska- Security Challenges in Virtualized Environments
222 views
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attack: Vulnerability Detection and Attack Construction
220 views
Proceedings of the Workshop on Binary Instrumentation and Applications 2009
216 views
Wolf Zimmermann- On the Correctness of Transformations in Compiler Back-Ends
217 views
Next >