(2009). Identifying Malicious Code Through Reverse Engineering. Springer US. https://doi.org/10.1007/978-0-387-89468-3
Chicago Style (17th ed.) CitationIdentifying Malicious Code Through Reverse Engineering. Berlin: Springer US, 2009. https://doi.org/10.1007/978-0-387-89468-3.
MLA (9th ed.) CitationIdentifying Malicious Code Through Reverse Engineering. Springer US, 2009. https://doi.org/10.1007/978-0-387-89468-3.
Warning: These citations may not always be 100% accurate.