V

Наибольший вклад в теги

Все теги (1)

Лучшие ответы пользователя

Все ответы (1)
  • Есть ли смысл изучать Ассемблер?

    @Viacheslav78
    V
    Литература по Debugging, Vulnerability Analysis, Asm, ARM.

    Debugging:
    Bill Blunden. Software Exorcism. A Handbook for Debugging and Optimizing Legacy Code.
    Brian W. Fitzpatrick. Debugging Teams. Better Productivity through Collaboration.
    Butcher Paul. Debug It. Find, Repair, and Prevent Bugs in Your Code.
    Debugging Linux Systems with GNU GDB.
    Eric Lawrence. Debugging with Fiddler. The complete reference from the creator of the Fiddler Web Debugger.
    Mario Hewardt, Daniel Pravat. Advanced Windows Debugging.
    Mario Hewardt. Advanced .NET Debugging.
    Matthew A. Telles, Yuan Hsieh. The Science of Debugging.
    Norman Matloff. Peter Jay Salzman. THE ART OF DEBUGGING WITH GDB, DDD, AND ECLIPSE.
    Rajaram Regupathy. Bootstrap Yourself with Linux-USB Stack. Design, Develop, Debug, and Validate Embedded USB Systems.
    Richard Foley. Pro Perl Debugging. From Professional to Expert.
    Richard H. Carver, Kuo-Chung Tai. Modern Multithreading Implementing, Testing, and Debugging Multithreaded Java and C++ & Pthreads & Win32 Programs.
    Richard Stallman, Roland Pesch, Stan Shebs, et al. Debugging with GDB - the GNU Source-Level Debugger.
    Steve Maguire. Debugging the Development Process.
    Tarik Soulami. Inside Windows Debugging. A Practical Guide to Debugging and Tracing Strategies in Windows.
    Thorsten Grötker, Ulrich Holtmann, Holger Keding, Markus Wloka. The Developer's Guide to Debugging.
    Cristina Cifuentes. Reverse Compilation Techniques.

    Vulnerability Analysis:
    Abraham Ghebrehiwet Ghebremedhin. Combining Static Source Code Analysis and Threat Assessment Modeling For Testing Open Source Software Security.
    Adam Loe Doup´e. Advanced Automated Web Application Vulnerability Analysis.
    Antti Vayrynen. Finding third-party components with binary analysis.
    David B. Dewey. FINDING AND REMEDYING HIGH-LEVEL SECURITY ISSUES IN BINARY CODE.
    David Brumley. Analysis and Defense of Vulnerabilities in Binary Code.
    Fabian Yamaguchi. Automated Extraction of API Usage Patterns from Source Code for Vulnerability Identification.
    Fabian Yamaguchi. Pattern-Based Vulnerability Discovery.
    Falko Strenzke. Efficiency and Implementation Security of Code-based Cryptosystems.
    Francisco Jose Marques Vieira. Realistic Vulnerability Injections in PHP Web Applications.
    George Perera. PURPOSEFULLY MANUFACTURED VULNERABILITIES IN U.S. GOVERNMENT TECHNOLOGY MICROCHIPS. RISKS AND HOMELAND SECURITY IMPLICATIONS.
    Guidelines for Implementation of REST.
    Gustav Ahlberg. Generating web applications containing XSS and CSRF vulnerabilities.
    Jay-Evan J. Tevis. AUTOMATIC DETECTION OF SOFTWARE SECURITY VULNERABILITIES IN EXECUTABLE PROGRAM FILES.
    Jing Xie. INTERACTIVE PROGRAMMING SUPPORT FOR SECURE SOFTWARE DEVELOPMENT.
    Mario Heiderich. Towards Elimination of XSS Attacks with a Trusted and Capability Controlled DOM.
    Martin Johns. Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting.
    Prateek Saxena. Systematic Techniques for Finding and Preventing Systematic Techniques for Finding and Preventing.
    Rami M. F. Jnena. Modern Approach for WEB Applications Vulnerability Analysis.
    Richard Wartell. REWRITING X86 BINARIES WITHOUT CODE PRODUCER COOPERATION.
    Runar Moen. Creating secure software.
    Ryan Dewhurst. Implementing Basic Static Code Analysis into Integrated Development Environments (IDEs) to Reduce Software Vulnerabilities.
    Sidney E Valentine. PLC Code Vulnerabilities Through SCADA Systems.
    Sooel Son, B.S., M.S. Toward Better Server-side Web Security.
    SRUTHI BANDHAKAVI. AUTOMATED DETECTION OF INJECTION VULNERABILITIES IN WEB APPLICATIONS.
    Steven Craig Hanna Jr. Attacks on Emerging Architectures.
    Thomas Hofer. Evaluating Static Source Code Analysis Tools.
    Tyler Bletsch. Code-Reuse Attacks. New Frontiers and Defenses.
    Wolf-Steffen Rodiger. Merging Static Analysis and Model Checking for Improved Security Vulnerability Detection.
    Yuchen Zhou. Improving Security and Privacy of Integrated Web Applications.

    Assembler:
    Blum Richard. Professional Assembly Language.
    Cavanagh Joseph. X86 Assembly Language and C Fundamentals.
    Duntemann Jeff. Assembly Language Step-by-Step. Programming with Linux.
    Irvine K.R. Assembly Language for x86 Processors. Seventh Edition.
    Irvine K.R. Assembly Language for x86 Processors. Sixth Edition.
    Kusswurm D. Modern X86 Assembly Language Programming. 32-bit, 64-bit, SSE, and AVX.
    Leiterman J.C. 32-64-Bit 80x86 Assembly Language Architecture.
    Neveln Bob. Linux Assembly Language Programming.
    Rose Chris. Assembly Language Succinctly.
    Seyfarth Ray. Introduction to 64 Bit Intel Assembly Language Programming for Linux.
    Hyde R. The Art of Assembly Language (Second Edition).
    Dandamudi S.P. Guide to Assembly Language Programming in Linux.

    ARM:
    Holt W. ARM Assembly Language. Fundamentals and Techniques.
    Langbridge J.A. Professional Embedded ARM Development.
    Магда Ю.С. Программирование и отладка C C++ приложений для микроконтроллеров ARM.
    Tay Raymond. OpenCL Parallel Programming Development Cookbook.
    Mahout Vincent. Assembly Language Programming ARM Cortex-M3.
    Sloss Andrew N. Symes D. Wright C. ARM System Developers Guide. Designing and Optimizing System Software.
    Valvano J.W. Embedded Systems. Introduction to Arm Cortex™-M Microcontrollers. Volume 1.
    Yui J. The Definitive Guide to ARM Cortex-M0 and Cortex-M0+ Processors.
    Ответ написан
    2 комментария