I attempted to diagram everything I've learned about the problem-set of endpoint threat recognition over the past 2 years of research. Anything wrong so far?
2021-11-01 01:44:25 Author: www.reddit.com(查看原文) 阅读量:26 收藏

3

Log in or sign up to leave a comment

level 1

Op · 2h · edited 2h

I posted this over on r/lowlevel but thought this community might be a good place for feedback on this subject too. If not just let me know and I'll delete this post. It's not exactly about reverse engineering, per se, but I imagine reverse engineers would want to understand all of these concepts.

1

A moderated community dedicated to all things reverse engineering.

113k

Members

86

Online


Created Sep 11, 2008


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/qjtf0l/i_attempted_to_diagram_everything_ive_learned/
如有侵权请联系:admin#unsafe.sh