Identifying Malicious Code Through Reverse Engineering | MenrvaBooks