Techniques to reverse engineer an Android application
- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 393字
- 2021-06-24 16:39:44
上QQ閱讀APP看后續(xù)精彩內(nèi)容
登錄訂閱本章 >
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- Kali Linux CTF Blueprints
- INSTANT Windows PowerShell
- Computer Forensics with FTK
- 隱私計(jì)算
- 從0到1:CTFer成長(zhǎng)之路
- API安全技術(shù)與實(shí)戰(zhàn)
- Mastering Reverse Engineering
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實(shí)戰(zhàn)
- CTF特訓(xùn)營(yíng):技術(shù)詳解、解題方法與競(jìng)賽技巧
- Learning Pentesting for Android Devices
- 黑客攻防從入門到精通
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- VMware vCloud Security
- Kali Linux高級(jí)滲透測(cè)試(原書第4版)