- DocumentWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endstéléversé parWhite909
- DocumentProgramming with GNU Softwaretéléversé parWhite909
- DocumentMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialtéléversé parWhite909
- DocumentGNU Linear Programming Kittéléversé parWhite909
- DocumentEssentials of Adobe Flashtéléversé parWhite909
- DocumentSimon Josefsson- GNU Generic Security Service Librarytéléversé parWhite909
- DocumentRay Toal- Ajax Programmingtéléversé parWhite909
- DocumentJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectiontéléversé parWhite909
- DocumentGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHuntertéléversé parWhite909
- DocumentManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologytéléversé parWhite909
- DocumentKernel-Land Rootkitstéléversé parWhite909
- DocumentAlexander Kornbrust- Oracle Rootkits 2.0téléversé parWhite909
- DocumentAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?téléversé parWhite909
- DocumentAndreas Bunten- UNIX and Linux based Kernel Rootkitstéléversé parWhite909
- DocumentJem Berkes- Topics in Network Securitytéléversé parWhite909
- DocumentHallvar Helleseth- Wi-Fi Securitytéléversé parWhite909
- DocumentPietro Cenciarelli- Computational applications of calculi based on monadstéléversé parWhite909
- DocumentGraham Williams- Debian GNU/Linuxtéléversé parWhite909
- DocumentSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptiontéléversé parWhite909
- DocumentReverend Bill Blunden- The Rootkit Arsenaltéléversé parWhite909
- DocumentChris Ries- Inside Windows Rootkitstéléversé parWhite909
- DocumentDouglas P. Medley- Virtualization Technology Applied to Rootkit Defensetéléversé parWhite909
- DocumentJohn Heasman- Firmware Rootkitstéléversé parWhite909
- DocumentWangYao- Rootkit on Linux x86téléversé parWhite909
- DocumentSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirttéléversé parWhite909
- DocumentChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationtéléversé parWhite909
- DocumentJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?téléversé parWhite909
- DocumentJoanna Rutkowska- Security Challenges in Virtualized Environmentstéléversé parWhite909
- DocumentGreg Morrisett- The Engineering Challenges of Trustworthy Computingtéléversé parWhite909
- DocumentGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debuggingtéléversé parWhite909
- DocumentProceedings of the Workshop on Binary Instrumentation and Applications 2009téléversé parWhite909
- DocumentZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attacktéléversé parWhite909
- DocumentAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionstéléversé parWhite909
- DocumentCollin Mulliner- Fuzzing the Phone in your Phonetéléversé parWhite909
- DocumentRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programmingtéléversé parWhite909
- DocumentF-Secure Linux Securitytéléversé parWhite909
- DocumentDoug Tidwell- Tutorialtéléversé parWhite909