Resources: Difference between revisions

Jump to navigation Jump to search
No change in size ,  14 years ago
m
Moved to another container.
[unchecked revision][unchecked revision]
(Importing links from ancient wiki page Application-Security-Books)
m (Moved to another container.)
Line 88:
* [http://www.nondot.org/sabre/os/articles/DeviceDriverInterfaces/ Device Driver Interfaces]
* [http://home.teleport.com/~brainy/fatgen102.pdf FAT12-32]
 
== Other Specifications ==
* [http://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426 The Art of Software Security Assessment]
* [http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1210492590&sr=1-1 Art of Exploitation]
* [http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1210492638&sr=1-1 Secrets of Reverse Engineering]
* [http://www.amazon.com/Rootkits-Subverting-Addison-Wesley-Software-Security/dp/0321294319/ref=pd_bbs_3?ie=UTF8&s=books&qid=1210492638&sr=1-3 Subverting the Windows Kernel]
 
== Other Specifications ==
* [http://alexfru.narod.ru/emiscdocs.html stockpile of technical documents (partly in Russian)]
* [http://www.nondot.org/sabre/os/articles/OtherHardware/ Legos, ATX, NetPC's..]
252

edits

Cookies help us deliver our services. By using our services, you agree to our use of cookies.

Navigation menu