Arm assembly : internals & reverse engineering /
Finding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Micr...
| Call Number: | Libro Electrónico |
|---|---|
| Main Author: | |
| Format: | Electronic eBook |
| Language: | Inglés |
| Published: |
Hoboken, NJ :
John Wiley & Sons, Inc.,
2023.
|
| Edition: | Blue fox edition. |
| Subjects: | |
| Online Access: | Texto completo (Requiere registro previo con correo institucional) |


