BOOK
READER
1
of
199
You are about to access our book library
"
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) full version
"
.