Beginning with a basic primer on reverse engineering-includingcomputer internals, operating systems, and assembly language-andthen discussing the various
applications of reverse engineering, this book provides readerswith practical, in-depth techniques for software reverseengineering. The book is broken into two parts, the first dealswith security-related reverse engineering and the second exploresthe more practical aspects of reverse engineering. In addition, theauthor explains how to reverse engineer a third-party softwarelibrary to improve interfacing and how to reverse engineer acompetitor's software to build a better product.
* The first popular book to show how software reverse engineeringcan help defend against security threats, speed up development, andunlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackersexploit reverse engineering techniques to crack copy-protectionschemes and identify software targets for viruses and othermalware
* Offers a primer on advanced reverse-engineering, delving into"disassembly"-code-level reverse engineering-and explaining how todecipher assembly language
Reversing: Secrets of Reverse Engineering
📄 Viewing lite version
Full site ›
26.12
USD
🛒 Buy New on Amazon 🇺🇸
Book Details
Author(s)Eldad Eilam,
PublisherWiley
ISBN / ASIN0764574817
ISBN-139780764574818
Sales Rank100,297
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
Similar Products ▼
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
- Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes
- Hacking: The Art of Exploitation, 2nd Edition
- Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)
- Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- The Hacker Playbook 3: Practical Guide To Penetration Testing
More Books in Computers
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View