Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Dang, Bruce

ISBN 10: 1118787315 ISBN 13: 9781118787311
Verlag: Wiley, 2014
Neu Paperback

Verkäufer Russell Books, Victoria, BC, Kanada Verkäuferbewertung 4 von 5 Sternen 4 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Heritage Bookseller
AbeBooks-Mitglied seit 1996


Beschreibung

Beschreibung:

Special order direct from the distributor. Bestandsnummer des Verkäufers ING9781118787311

Diesen Artikel melden

Inhaltsangabe:

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.

The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.

  • Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
  • Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
  • Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
  • Demystifies topics that have a steep learning curve
  • Includes a bonus chapter on reverse engineering tools

Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.

Über die Autorin bzw. den Autor: Bruce Dang is a senior security development engineering lead at Microsoft focusing on Windows kernel and reverse engineering.

Alexandre Gazet is a senior security researcher at QuarksLab focusing on reverse engineering and software protection.

Elias Bachaalany is a software security engineer at Microsoft.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Bibliografische Details

Titel: Practical Reverse Engineering: x86, x64, ARM...
Verlag: Wiley
Erscheinungsdatum: 2014
Einband: Paperback
Zustand: New
Auflage: 1st Edition.

Beste Suchergebnisse bei AbeBooks

Foto des Verkäufers

Bruce Dang
ISBN 10: 1118787315 ISBN 13: 9781118787311
Neu Paperback Erstausgabe

Anbieter: CitiRetail, Stevenage, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Paperback. Zustand: new. Paperback. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Bestandsnummer des Verkäufers 9781118787311

Verkäufer kontaktieren

Neu kaufen

EUR 54,96
EUR 42,47 shipping
Versand von Vereinigtes Königreich nach USA

Anzahl: 1 verfügbar

In den Warenkorb

Foto des Verkäufers

Bruce Dang
ISBN 10: 1118787315 ISBN 13: 9781118787311
Neu Paperback Erstausgabe

Anbieter: Grand Eagle Retail, Bensenville, IL, USA

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Paperback. Zustand: new. Paperback. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9781118787311

Verkäufer kontaktieren

Neu kaufen

EUR 55,30
Versand gratis
Versand innerhalb von USA

Anzahl: 1 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Bruce Dang
Verlag: John Wiley & Sons Inc, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Neu Softcover Erstausgabe

Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: New. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Num Pages: 384 pages, figures. BIC Classification: TBC; UYF. Category: (P) Professional & Vocational. Dimension: 191 x 235 x 21. Weight in Grams: 650. . 2014. 1st Edition. Paperback. . . . . Bestandsnummer des Verkäufers V9781118787311

Verkäufer kontaktieren

Neu kaufen

EUR 61,61
EUR 10,50 shipping
Versand von Irland nach USA

Anzahl: 4 verfügbar

In den Warenkorb

Foto des Verkäufers

Bruce Dang
ISBN 10: 1118787315 ISBN 13: 9781118787311
Neu Paperback Erstausgabe

Anbieter: AussieBookSeller, Truganina, VIC, Australien

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Paperback. Zustand: new. Paperback. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability. Bestandsnummer des Verkäufers 9781118787311

Verkäufer kontaktieren

Neu kaufen

EUR 87,82
EUR 31,54 shipping
Versand von Australien nach USA

Anzahl: 1 verfügbar

In den Warenkorb