- DocumentWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endsuploaded by
White909
- DocumentProgramming with GNU Softwareuploaded by
White909
- DocumentMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialuploaded by
White909
- DocumentGNU Linear Programming Kituploaded by
White909
- DocumentEssentials of Adobe Flashuploaded by
White909
- DocumentSimon Josefsson- GNU Generic Security Service Libraryuploaded by
White909
- DocumentRay Toal- Ajax Programminguploaded by
White909
- DocumentJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectionuploaded by
White909
- DocumentGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHunteruploaded by
White909
- DocumentManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologyuploaded by
White909
- DocumentKernel-Land Rootkitsuploaded by
White909
- DocumentAlexander Kornbrust- Oracle Rootkits 2.0uploaded by
White909
- DocumentAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?uploaded by
White909
- DocumentAndreas Bunten- UNIX and Linux based Kernel Rootkitsuploaded by
White909
- DocumentJem Berkes- Topics in Network Securityuploaded by
White909
- DocumentHallvar Helleseth- Wi-Fi Securityuploaded by
White909
- DocumentPietro Cenciarelli- Computational applications of calculi based on monadsuploaded by
White909
- DocumentGraham Williams- Debian GNU/Linuxuploaded by
White909
- DocumentSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptionuploaded by
White909
- DocumentReverend Bill Blunden- The Rootkit Arsenaluploaded by
White909
- DocumentChris Ries- Inside Windows Rootkitsuploaded by
White909
- DocumentDouglas P. Medley- Virtualization Technology Applied to Rootkit Defenseuploaded by
White909
- DocumentJohn Heasman- Firmware Rootkitsuploaded by
White909
- DocumentWangYao- Rootkit on Linux x86uploaded by
White909
- DocumentSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirtuploaded by
White909
- DocumentChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationuploaded by
White909
- DocumentJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?uploaded by
White909
- DocumentJoanna Rutkowska- Security Challenges in Virtualized Environmentsuploaded by
White909
- DocumentGreg Morrisett- The Engineering Challenges of Trustworthy Computinguploaded by
White909
- DocumentGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debugginguploaded by
White909
- DocumentProceedings of the Workshop on Binary Instrumentation and Applications 2009uploaded by
White909
- DocumentZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attackuploaded by
White909
- DocumentAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionsuploaded by
White909
- DocumentCollin Mulliner- Fuzzing the Phone in your Phoneuploaded by
White909
- DocumentRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programminguploaded by
White909
- DocumentF-Secure Linux Securityuploaded by
White909
- DocumentDoug Tidwell- Tutorialuploaded by
White909