1
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Software Security by Example -- Software Reverse Engineering -- Trusted Computing -- Security via Trusted...