Techniques to reverse engineer an Android application
- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 393字
- 2021-06-24 16:39:44
上QQ閱讀APP看后續(xù)精彩內(nèi)容
登錄訂閱本章 >
推薦閱讀
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Enterprise Cloud Security and Governance
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Network Scanning Cookbook(Second Edition)
- Computer Forensics with FTK
- CTF那些事兒
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 華為防火墻實(shí)戰(zhàn)指南
- 電腦安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- 信息安全工程與實(shí)踐
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- Practical Internet of Things Security