Arm assembly : internals & reverse engineering /
Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Micr...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Hoboken, NJ :
John Wiley & Sons, Inc.,
2023.
|
Edition: | Blue fox edition. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |