|
Product Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the variousapplications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Features
- Used Book in Good Condition
Customers Who Bought This Item Also Bought
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular Disassembler
- Windows Internals, Part 1 (Developer Reference)
- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
- Hacking: The Art of Exploitation, 2nd Edition
- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes
*If this is not the "Reversing: Secrets of Reverse Engineering" product you were looking for, you can check the other results by clicking this link. Details were last updated on Dec 3, 2024 21:44 +08.