Identifying Malicious Code Through Reverse Engineering (Advances in Information Security, 44) | EKB DL