SqlDbx
HellrAiser System Utility V4 Reversing
Na2009 enus devi_01
SafeNet White Paper Developers Guide to Software Protection
Manual
Sample chapter from Reverse Engineering Course.
Reflective Memory Attacks Deep Dive: How They Work; Why They’re Hard to Detect
SuperOrca Manual
The NET File Format
Analyzing Malicious Code Nicolas Brulez Ryan Russell Disassembly with a time constraint Recon 2005.
Modules and Object-Oriented Programming. Modules (Packages) Programming in the Large Information hiding Limit the ways in which one part of the program.