Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides reader...

Buy Now From Amazon

Product Review

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

  • Used Book in Good Condition

Similar Products

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwarePractical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and ObfuscationThe IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular DisassemblerHacking: The Art of Exploitation, 2nd EditionThe Shellcoder's Handbook: Discovering and Exploiting Security HolesMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious CodePractical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and DisassemblyWindows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac MemoryThe Web Application Hacker's Handbook: Finding and Exploiting Security Flaws