Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Reversing: Secrets of Reverse Engineering - ISBN 9780764574818

Reversing: Secrets of Reverse Engineering

ISBN 9780764574818

Autor: Eldad Eilam

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 181,65 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780764574818

ISBN10:      

0764574817

Autor:      

Eldad Eilam

Oprawa:      

Paperback

Rok Wydania:      

2005-04-15

Ilość stron:      

624

Wymiary:      

235x195

Tematy:      

UP

Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That′s exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse–engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You′ll learn how here.Learn to read compiler–generated assembly language code for IA–32 compatible processorsDecipher an undocumented file format or network protocolUnderstand when reverse engineering is legal, and when—and why—it may not be See how hackers use reversing to defeat copy protection technologyFind out how to pull the plug on malicious codeDetermine how to prevent others from reversing your code, and find out how effective such steps can beExplore reverse engineering on the .NET platform and its assembly language, MSILObserve the dissection of a real–world malicious program and see how the attacker used it to control infected systems

Spis treści:
Foreword.
Acknowledgments.
Introduction.
Part I: Reversing 101.
Chapter 1: Foundations.
Chapter 2: Low–Level Software.
Chapter 3: Windows Fundamentals.
Chapter 4: Reversing Tools.
Part II: Applied Reversing.
Chapter 5: Beyond the Documentation.
Chapter 6: Deciphering File Formats.
Chapter 7: Auditing Program Binaries.
Chapter 8: Reversing Malware.
Part III: Cracking.
Chapter 9: Piracy and Copy Protection.
Chapter 10: Antireversing Techniques.
Chapter 11: Breaking Protections.
Part IV: Beyond Disassembly.
Chapter 12: Reversing .NET.
Chapter 13: Decompilation.
Ap pendix A: Deciphering Code Structures.
Appendix B: Understanding Compiled Arithmetic.
Appendix C: Deciphering Program Data.
Index.

Nota biograficzna:
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in–depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.

Okładka tylna:
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That′s exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse–engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You′ll learn how here.Learn to read compiler–generated assembly language code for IA–32 compatible processorsDecipher an undocumented file format or network protocolUnderstand when reverse engineering is legal, and when—and why—it may not be See how hackers use reversing to defeat copy protection technologyFind out how to pull the plug on malicious codeDetermine how to prevent others from reversing your code, and find out how effective such steps can beExplore reverse engineering on the .NET platform and its assembly language, MSILObserve the dissection of a real–world malicious program and see how the attacker used it to control infected systems

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy