Книга: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Назад: Conclusion
Дальше: V. Anti-Reverse-Engineering

, since when developing network signatures, you’ll often need to deal with encoded content.