Reversing Secrets of Reverse Engineering
2008-08-07 05:58
429 查看
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
http://rapidshare.com/files/27773043/I0764574817.rar
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
http://rapidshare.com/files/27773043/I0764574817.rar
相关文章推荐
- Reversing - Secrets of Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Reversing: Secrect of Reverse Engineering by Wiley
- Writeup of Imageprc(reverse) in reversing.kr
- Anti Reverse Engineering Uncovered by Nicolas Brulez Chief of Security - The Armadillo Software Prot
- The task of making reverse engineering difficult is not easy.
- Reverse engineering of Object Oriented Cod Monograph Computer Science
- 基于二进制程序的类型推导--TIE: Principled Reverse Engineering of Types in Binary Programs
- CrowdStrike unleashes CrowdRE to promote collaborative reverse engineering of malware
- the bug of MyEclipse Hibernate Reverse Engineering
- 论文笔记 TIE: Principled Reverse Engineering of Types in Binary Programs
- Practice of Android Reverse Engineering
- Writeup of Ransomeware(reverse) in reversing.kr
- Scan of the Month 33: Anti Reverse Engineering Uncovered
- Dr. Mao's Secrets of Longevity___Toxins in the Kitchen
- Secrets Of The Masters: Core Java Job Interview Questions
- The Secrets of Oracle Row Chaining and Migration
- Reverse digits of an integer_Leetcode_#7
- 345. Reverse Vowels of a String
- TwoPointers-345-Reverse Vowels of a String