Chapter 13. Parsing Third-Party Application Files
- Practical Mobile Forensics(Second Edition)
- Heather Mahalik Rohit Tamma Satish Bommisetty
- 184字
- 2021-07-16 10:56:21
上QQ閱讀APP看后續精彩內容
登錄訂閱本章 >
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業互聯網安全防護與展望
- Metasploit Penetration Testing Cookbook(Second Edition)
- 開發者的Web安全戒律:真實威脅與防御實踐
- 數字安全藍皮書:本質屬性與重要特征
- 計算機病毒原理與防范(第2版)
- Computer Forensics with FTK
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- Falco云原生安全:Falco原理、實踐與擴展
- Mastering Reverse Engineering
- 網絡安全態勢感知
- End to End GUI Development with Qt5
- SQL Injection Strategies
- Hands-On Artificial Intelligence for Cybersecurity
- 信息系統安全等級化保護原理與實踐