Reversing: Secrets of Reverse Engineering (Paperback)
Eldad Eilam
- 出版商: Wiley
- 出版日期: 2005-04-15
- 售價: $1,300
- 貴賓價: 9.5 折 $1,235
- 語言: 英文
- 頁數: 624
- 裝訂: Paperback
- ISBN: 0764574817
- ISBN-13: 9780764574818
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$980$833 -
$800$680 -
$590$466 -
$680$578 -
$750$638 -
$560$476 -
$750$638 -
$780$616 -
$490$382 -
$990$782 -
$1,450$1,378 -
$2,030$1,929 -
$650$507 -
$580$452 -
$620$527 -
$750$638 -
$590$460 -
$560$437 -
$880$748 -
$780$663 -
$580$493 -
$620$490 -
$780$663 -
$1,485Hacking: The Art of Exploitation, 2/e (Paperback)
-
$580$458
商品描述
Description:
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Table of Contents:
Foreword.
Acknowledgments.
Introduction.
Part I: Reversing 101.
Chapter 1: Foundations.
Chapter 2: Low-Level Software.
Chapter 3: Windows Fundamentals.
Chapter 4: Reversing Tools.
Part II: Applied Reversing.
Chapter 5: Beyond the Documentation.
Chapter 6: Deciphering File Formats.
Chapter 7: Auditing Program Binaries.
Chapter 8: Reversing Malware.
Part III: Cracking.
Chapter 9: Piracy and Copy Protection.
Chapter 10: Antireversing Techniques.
Chapter 11: Breaking Protections.
Part IV: Beyond Disassembly.
Chapter 12: Reversing .NET.
Chapter 13: Decompilation.
Appendix A: Deciphering Code Structures.
Appendix B: Understanding Compiled Arithmetic.
Appendix C: Deciphering Program Data.
Index.