Bài đăng

Đang hiển thị bài đăng từ Tháng 5, 2017

Identifying Malicious Code Through Reverse Engineering

http://repository.vnu.edu.vn/handle/VNU_123/29339

A Guide to Computer Network Security

http://repository.vnu.edu.vn/handle/VNU_123/29297

Abstract State Machines, B and Z

http://repository.vnu.edu.vn/handle/VNU_123/23860

Abstract State Machines, B and Z

http://repository.vnu.edu.vn/handle/VNU_123/23860

Advances in Cryptology - CRYPTO 2008

http://repository.vnu.edu.vn/handle/VNU_123/24144