- Mastering Reverse Engineering
- Reginald Wong
- 132字
- 2021-06-10 19:40:19
Technical requirements
We will work in an environment that will make use of virtualization software. It is recommended that we have a physical machine with virtualization enabled and a processor with at least four cores, 4 GB of RAM, and 250 GB of disk space. Pre-install this physical machine with either the Windows or Linux operating system.
We will be using VirtualBox in our setup. The host operating system version of Windows or Linux will depend on the requirements of VirtualBox. See the latest version of VirtualBox at https://www.virtualbox.org/ and look for the recommended requirements.
You may need to download virtual machines from Microsoft in advance, as these may take some time to download. See the developers' page at https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/. Windows 10 can be downloaded from the following link: https://www.microsoft.com/en-us/software-download/windows10
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 工業(yè)互聯(lián)網(wǎng)安全
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- 數(shù)字安全藍(lán)皮書:本質(zhì)屬性與重要特征
- Python Penetration Testing Cookbook
- Learning Devise for Rails
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Building a Home Security System with BeagleBone
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- 物聯(lián)網(wǎng)信息安全技術(shù)
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測試
- CPK通向賽博安全之路:理論與實(shí)踐CPK Solution to Cyber Security:Theory and Practice
- ATT&CK視角下的紅藍(lán)對抗實(shí)戰(zhàn)指南