Reversing Hackers Gde Reverse Engineerin Secrets of Reverse Engineering
Afbeeldingen
Sla de afbeeldingen overArtikel vergelijken
- Engels
- Paperback
- 9780764574818
- 15 april 2005
- 624 pagina's
Samenvatting
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows youhow to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and when and whyit may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
Companion Web site Visit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Productspecificaties
Inhoud
- Taal
- en
- Bindwijze
- Paperback
- Oorspronkelijke releasedatum
- 15 april 2005
- Aantal pagina's
- 624
- Illustraties
- Nee
Betrokkenen
- Hoofdauteur
- Eldad Eilam
- Hoofduitgeverij
- WILQ
Overige kenmerken
- Extra groot lettertype
- Nee
- Product breedte
- 187 mm
- Product hoogte
- 43 mm
- Product lengte
- 233 mm
- Studieboek
- Ja
- Verpakking breedte
- 189 mm
- Verpakking hoogte
- 230 mm
- Verpakking lengte
- 42 mm
- Verpakkingsgewicht
- 933 g
EAN
- EAN
- 9780764574818
Je vindt dit artikel in
- Categorieën
- Taal
- Engels
- Boek, ebook of luisterboek?
- Boek
- Beschikbaarheid
- Leverbaar
- Studieboek of algemeen
- Algemene boeken
Kies gewenste uitvoering
Prijsinformatie en bestellen
De prijs van dit product is 29 euro en 99 cent.- Prijs inclusief verzendkosten, verstuurd door bol
- Ophalen bij een bol afhaalpunt mogelijk
- 30 dagen bedenktijd en gratis retourneren
- Dag en nacht klantenservice
Vaak samen gekocht
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.