نتایج جستجو
Identifying Malicious Code through Reverse Engineering
Abhishek Singh (auth.), 2009
Identifying malicious code through reverse engineering
Abhishek Singh (auth.), 2009
Identifying Malicious Code Through Reverse Engineering
Abhishek Singh, 2009
I. M. Wright's Hard Code
Eric Brechner, 2007
I. M. Wright's "Hard code" : a decade of hard-won lessons from Microsoft
Eric Brechner, 2011
FFTs for Programmers Algorithms and Source Code
Arndt J., 2001
Design of Welded Tubular Connections. Basis and Use of AWS Code Provisions
P.W. Marshall (Auth.), 1992
Программирование на Python. CODE
Марк Лутц, 2002
Genomic Perl : from bioinformatics basics to working code
Rex A Dwyer, 2003
Genomic Perl: From Bioinformatics Basics to Working Code
Rex A. Dwyer, 2002
Genomic Perl: From Bioinformatics Basics to Working Code
Dwyer R.A., 2002
Practical Nursing Philosophy: The Universal Ethical Code
Dr. David Seedhouse, 2000
The Genetic code and the origin of life
Lluís Ribas de Pouplana, 2004
The money code : improve your entire financial life right now
Joe Duran, 2013
The Money Code: Improve Your Entire Financial Life Right Now
Joe John Duran, 2013
Building Secure Defenses Against Code-Reuse Attacks
Lucas Davi, 2015
Working Effectively with Legacy Code
Michael Feathers, 2004
Writing bug-free C code
Jongerius J, 2005
