794K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6R3&6i4K6u0r3i4K6g2X3e0g2y4b7M7X3g2K6M7#2)9#2k6W2)9#2k6U0t1H3g2%4u0A6N6r3W2F1k6#2)9#2k6U0t1H3f1$3g2U0N6i4u0W2i4K6g2X3x3U0m8o6L8$3c8W2i4K6u0W2M7r3c8X3
==================
19 Deadly Sins of Software Security
b04K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6b7H3i4K6u0r3x3o6l9%4x3U0t1$3x3o6R3#2z5q4)9J5k6f1#2U0k6%4u0S2N6#2)9J5k6p5S2A6L8r3I4Q4y4h3j5J5x3p5!0Q4x3V1q4Q4x3V1q4G2M7X3&6W2i4K6g2X3x3U0m8y4k6h3c8A6j5g2)9J5k6e0p5&6i4K6g2X3x3U0m8p5k6h3q4V1L8s2W2Q4y4h3j5J5x3q4y4A6L8Y4y4Q4y4h3j5J5x3r3!0X3i4K6g2X3x3U0m8e0L8$3k6@1N6$3q4J5k6g2)9#2k6U0t1H3f1$3g2U0N6i4u0A6N6s2W2Q4y4h3j5J5x3q4)9#2k6W2y4W2j5%4g2J5K9i4c8&6i4K6g2X3x3R3`.`.
=======================
High Level Reverse Engineering
8bcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6R3&6i4K6u0r3i4K6g2X3e0g2y4b7M7X3g2K6M7#2)9#2k6W2)9#2k6U0t1H3g2%4u0A6N6r3W2F1k6#2)9#2k6U0t1H3f1$3g2U0N6i4u0W2i4K6g2X3x3U0m8o6L8$3c8W2i4K6u0W2M7r3c8X3
======================
Software Security Building Security In 2006
Malicious Mobile Code Virus Protection for Windows
0f0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7%4x3o6V1#2z5o6b7K6i4K6u0r3e0#2u0W2K9h3I4D9P5g2)9J5k6p5#2S2L8r3W2U0K9h3!0#2M7#2)9J5k6f1#2G2j5X3W2D9k6g2)9J5k6f1y4G2k6r3g2Q4x3X3g2h3K9i4u0#2M7#2)9J5k6g2m8J5L8%4c8W2j5%4c8A6L8$3&6Q4x3X3g2X3L8%4u0Q4x3X3g2i4K9h3&6V1L8%4N6K6i4K6u0W2M7X3q4J5