The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was keep. plicit 11:09, 25 September 2021 (UTC)[reply]

Hiew[edit]

Hiew (edit | talk | history | protect | delete | links | watch | logs | views) – (View log)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

It exists, but doesn't have the significance or coverage to meet WP:N. Has been in CAT:NN for over 11 years; hopefully, we can now resolve it. Boleyn (talk) 21:24, 4 September 2021 (UTC)[reply]

Note: This discussion has been included in the list of Software-related deletion discussions. Spiderone(Talk to Spider) 21:36, 4 September 2021 (UTC)[reply]
  • Peter Szor (2005). The Art of Computer Virus Research and Defense. Pearson Education. ISBN 9780672333903.
  • Kris Kaspersky (2007). Hacker Disassembling Uncovered, 2nd Ed. A-LIST, LLC.
  • Reginald Wong (2018). "Tools of the Trade". Mastering Reverse Engineering: Re-engineer Your Ethical Hacking Skills. Packt Publishing. p. 139. ISBN 9781788835299.
Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Extraordinary Writ (talk) 23:57, 11 September 2021 (UTC)[reply]
Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Extraordinary Writ (talk) 00:03, 19 September 2021 (UTC)[reply]
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.