eBooks-it.org Logo
eBooks-IT.org Inner Image

Reversing

Secrets of Reverse Engineering

Reversing Image

Book Details:

Publisher:Wiley
Series: Wiley
Author:Eldad Eilam
Edition:1
ISBN-10:0764574817
ISBN-13:9780764574818
Pages:624
Published:Apr 15 2005
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:8.56 MB

Book Description:

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the variousapplications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

Download Link:

Related Books:

Practical Reverse Engineering

X86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering Image
Analyzing how hacks are done, so as to stop them in the futureReverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much...



2007 - 2021 © eBooks-IT.org