Reversing : secrets of reverse engineering /
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book i...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley,
©2005.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocm80242141 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 050201s2005 inua fo 001 0 eng d | ||
010 | |a 2005921595 | ||
040 | |a REDDC |b eng |e pn |c REDDC |d HVC |d OCLCQ |d TEFOD |d EBLCP |d UMI |d IDEBK |d CEF |d MNU |d HNK |d OCLCQ |d DKDLA |d MERUC |d CCO |d E7B |d FVL |d B24X7 |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCF |d OCLCQ |d XFF |d OCLCQ |d TEFOD |d N$T |d MUX |d MHW |d OCLCQ |d OCLCO |d OCLCQ |d D6H |d AZK |d LOA |d AGLDB |d MOR |d PIFBR |d ZCU |d LIV |d OCLCQ |d U3W |d OCLCA |d BRL |d STF |d WRM |d OCLCQ |d VTS |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d COO |d CNNOR |d OCLCQ |d UAB |d WYU |d G3B |d TKN |d DKC |d OCLCQ |d S2H |d VLY |d UKCRE |d OCLCO |d UKAHL |d OCLCO |d OCLCQ |d VI# |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 63788750 |a 123159596 |a 181842018 |a 473078766 |a 560025747 |a 635506374 |a 647471971 |a 669756548 |a 722436706 |a 728034693 |a 806202462 |a 814300820 |a 888567421 |a 961541224 |a 962672076 |a 966144798 |a 988523411 |a 991965618 |a 1037469499 |a 1037708982 |a 1038624528 |a 1045580862 |a 1055397171 |a 1063812352 |a 1103262571 |a 1116791713 |a 1129377724 |a 1153019950 |a 1162216932 |a 1192340134 |a 1228527874 |a 1240510476 | ||
020 | |a 076459768X |q (electronic bk.) | ||
020 | |a 9780764597688 |q (electronic bk.) | ||
020 | |z 0764574817 |q (pbk.) | ||
020 | |z 9780764574818 |q (pbk.) | ||
020 | |a 1280255811 |q (ebk.) | ||
020 | |a 9781280255816 |q (ebk.) | ||
020 | |a 1118079760 | ||
020 | |a 9781118079768 | ||
020 | |a 9786610255818 | ||
020 | |a 6610255814 | ||
029 | 1 | |a AU@ |b 000048762110 | |
029 | 1 | |a AU@ |b 000051408691 | |
029 | 1 | |a AU@ |b 000053234862 | |
029 | 1 | |a DEBBG |b BV044080251 | |
029 | 1 | |a DEBSZ |b 355428652 | |
029 | 1 | |a DEBSZ |b 396063705 | |
029 | 1 | |a HEBIS |b 291499872 | |
029 | 1 | |a NZ1 |b 12037070 | |
035 | |a (OCoLC)80242141 |z (OCoLC)63788750 |z (OCoLC)123159596 |z (OCoLC)181842018 |z (OCoLC)473078766 |z (OCoLC)560025747 |z (OCoLC)635506374 |z (OCoLC)647471971 |z (OCoLC)669756548 |z (OCoLC)722436706 |z (OCoLC)728034693 |z (OCoLC)806202462 |z (OCoLC)814300820 |z (OCoLC)888567421 |z (OCoLC)961541224 |z (OCoLC)962672076 |z (OCoLC)966144798 |z (OCoLC)988523411 |z (OCoLC)991965618 |z (OCoLC)1037469499 |z (OCoLC)1037708982 |z (OCoLC)1038624528 |z (OCoLC)1045580862 |z (OCoLC)1055397171 |z (OCoLC)1063812352 |z (OCoLC)1103262571 |z (OCoLC)1116791713 |z (OCoLC)1129377724 |z (OCoLC)1153019950 |z (OCoLC)1162216932 |z (OCoLC)1192340134 |z (OCoLC)1228527874 |z (OCoLC)1240510476 | ||
037 | |a 25581 |b MIL | ||
050 | 4 | |a QA76.758 |b .E35 2005eb | |
072 | 7 | |a COM |x 051000 |2 bisacsh | |
082 | 0 | 4 | |a 005.1 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Eilam, Eldad. | |
245 | 1 | 0 | |a Reversing : |b secrets of reverse engineering / |c Eldad Eilam ; [foreword by Elliot Chikofsky]. |
260 | |a Indianapolis, IN : |b Wiley, |c ©2005. | ||
300 | |a 1 online resource (xxviii, 589 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome |2 rdacc | ||
340 | |p illustration |2 rdaill | ||
347 | |a text file |2 rdaft | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Part I: Reversing 101. Chapter 1: Foundations -- Chapter 2: Low-Level Software -- Chapter 3: Windows Fundamentals -- Chapter 4: Reversing Tools -- Part II: Applied Reversing. Chapter 5: Beyond the Documentation -- Chapter 6: Deciphering File Formats -- Chapter 7: Auditing Program Binaries -- Chapter 8: Reversing Malware -- Part III: Cracking. Chapter 9: Piracy and Copy Protection -- Chapter 10: Antireversing Techniques -- Chapter 11: Breaking Protections -- Part IV: Beyond Disassembly. Chapter 12: Reversing .NET -- Chapter 13: Decompilation -- Appendix A: Deciphering Code Structures -- Appendix B: Understanding Compiled Arithmetic -- Appendix C: Deciphering Program Data. | |
520 | |a Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse-engineering, delving into "disassembly," code-level reverse engineering, and explains how to decipher assembly language. | ||
546 | |a English. | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Software engineering. | |
650 | 0 | |a Reverse engineering. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Génie logiciel. | |
650 | 6 | |a Rétro-ingénierie. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Programming |x General. |2 bisacsh | |
650 | 7 | |a Software engineering. |2 blmlsh | |
650 | 7 | |a Reverse engineering. |2 blmlsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Reverse engineering |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
700 | 1 | |a Chikofsky, Elliot J. | |
758 | |i has work: |a Reversing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGbDFxgd4qkp8xqKPpWXbd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Eilam, Eldad. |t Reversing. |d Indianapolis, IN : Wiley, ©2005 |z 9780764574818 |w (DLC) 2005921595 |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=227440 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780764574818/?ar |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH21623013 | ||
938 | |a Books 24x7 |b B247 |n bks00036457 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL227440 | ||
938 | |a ebrary |b EBRY |n ebr10113939 | ||
938 | |a EBSCOhost |b EBSC |n 130978 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 25581 | ||
994 | |a 92 |b IZTAP |