Readers who enjoyed

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best…
Rate it:

also enjoyed

The Girl Who Played with Fire (Millennium #2)
The Expose
Millenium publisher Mikael Blomkvist has made his reputation exposing corrupt establishment figures. So when a young journalist approaches him with an investigation into sex trafficking, Blo…
Rate it:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Rate it:
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Delve inside Windows architecture and internals—and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is fully updated for Windows 7 and Windo…
Rate it:
A Philosophy of Software Design
4.18 avg. rating
· 3192 Ratings
This book addresses the topic of software how to decompose complex software systems into modules (such as classes and methods) that can be implemented relatively independently. The book first introduc…
Rate it:
Windows 10 System Programming, Part 2
Delve into programming the Windows operating system through the Windows API in with C++. Use the power of the Windows API to working with processes, threads, jobs, memory, I/O and more. The book cover…
Rate it:
Windows 10 System Programming, Part 1
Delve into programming the Windows operating system through the Windows API in with C++. Use the power of the Windows API to working with processes, threads, jobs, memory, I/O and more. The book cover…
Rate it:
Reversing: Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this boo…
Rate it: