Discusses how string analysis techniques work and how they can be applied to vulnerability detection in modern software applications
This book can be used as a textbook for a course on string analysis, or as a supplementary book for a course on vulnerability detection
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.








