Secrets of Reverse Engineering
Book Details:
| Publisher: | Wiley |
| Series: |
Wiley
|
| Author: | Eldad Eilam |
| Edition: | 1 |
| ISBN-10: | 0764574817 |
| ISBN-13: | 9780764574818 |
| Pages: | 624 |
| Published: | Apr 15 2005 |
| Posted: | Nov 19 2014 |
| Language: | English |
| Book format: | PDF |
| Book size: | 8.56 MB |
Book Description:
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the variousapplications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
X86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Analyzing how hacks are done, so as to stop them in the futureReverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much...
2007 - 2021 © eBooks-IT.org