A Guide to Kernel Exploitation
A Guide to Kernel Exploitation: Attacking the Core
Aggressive Network Self-Defense
Alternate Data Storage Forensics
AVIEN Malware Defense Guide for the Enterprise
© 2009-2024, Список Литературы