Loading…

Arm assembly : internals & reverse engineering /

Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Micr...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Markstedter, Maria
Format: Electronic eBook
Language:Inglés
Published: Hoboken, NJ : John Wiley & Sons, Inc., 2023.
Edition:Blue fox edition.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)