Cargando…

Reversing : secrets of reverse engineering /

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Eilam, Eldad
Otros Autores: Chikofsky, Elliot J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, ©2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm80242141
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 050201s2005 inua fo 001 0 eng d
010 |a  2005921595 
040 |a REDDC  |b eng  |e pn  |c REDDC  |d HVC  |d OCLCQ  |d TEFOD  |d EBLCP  |d UMI  |d IDEBK  |d CEF  |d MNU  |d HNK  |d OCLCQ  |d DKDLA  |d MERUC  |d CCO  |d E7B  |d FVL  |d B24X7  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d XFF  |d OCLCQ  |d TEFOD  |d N$T  |d MUX  |d MHW  |d OCLCQ  |d OCLCO  |d OCLCQ  |d D6H  |d AZK  |d LOA  |d AGLDB  |d MOR  |d PIFBR  |d ZCU  |d LIV  |d OCLCQ  |d U3W  |d OCLCA  |d BRL  |d STF  |d WRM  |d OCLCQ  |d VTS  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d COO  |d CNNOR  |d OCLCQ  |d UAB  |d WYU  |d G3B  |d TKN  |d DKC  |d OCLCQ  |d S2H  |d VLY  |d UKCRE  |d OCLCO  |d UKAHL  |d OCLCO  |d OCLCQ  |d VI#  |d OCLCO 
019 |a 63788750  |a 123159596  |a 181842018  |a 473078766  |a 560025747  |a 635506374  |a 647471971  |a 669756548  |a 722436706  |a 728034693  |a 806202462  |a 814300820  |a 888567421  |a 961541224  |a 962672076  |a 966144798  |a 988523411  |a 991965618  |a 1037469499  |a 1037708982  |a 1038624528  |a 1045580862  |a 1055397171  |a 1063812352  |a 1103262571  |a 1116791713  |a 1129377724  |a 1153019950  |a 1162216932  |a 1192340134  |a 1228527874  |a 1240510476 
020 |a 076459768X  |q (electronic bk.) 
020 |a 9780764597688  |q (electronic bk.) 
020 |z 0764574817  |q (pbk.) 
020 |z 9780764574818  |q (pbk.) 
020 |a 1280255811  |q (ebk.) 
020 |a 9781280255816  |q (ebk.) 
020 |a 1118079760 
020 |a 9781118079768 
020 |a 9786610255818 
020 |a 6610255814 
029 1 |a AU@  |b 000048762110 
029 1 |a AU@  |b 000051408691 
029 1 |a AU@  |b 000053234862 
029 1 |a DEBBG  |b BV044080251 
029 1 |a DEBSZ  |b 355428652 
029 1 |a DEBSZ  |b 396063705 
029 1 |a HEBIS  |b 291499872 
029 1 |a NZ1  |b 12037070 
035 |a (OCoLC)80242141  |z (OCoLC)63788750  |z (OCoLC)123159596  |z (OCoLC)181842018  |z (OCoLC)473078766  |z (OCoLC)560025747  |z (OCoLC)635506374  |z (OCoLC)647471971  |z (OCoLC)669756548  |z (OCoLC)722436706  |z (OCoLC)728034693  |z (OCoLC)806202462  |z (OCoLC)814300820  |z (OCoLC)888567421  |z (OCoLC)961541224  |z (OCoLC)962672076  |z (OCoLC)966144798  |z (OCoLC)988523411  |z (OCoLC)991965618  |z (OCoLC)1037469499  |z (OCoLC)1037708982  |z (OCoLC)1038624528  |z (OCoLC)1045580862  |z (OCoLC)1055397171  |z (OCoLC)1063812352  |z (OCoLC)1103262571  |z (OCoLC)1116791713  |z (OCoLC)1129377724  |z (OCoLC)1153019950  |z (OCoLC)1162216932  |z (OCoLC)1192340134  |z (OCoLC)1228527874  |z (OCoLC)1240510476 
037 |a 25581  |b MIL 
050 4 |a QA76.758  |b .E35 2005eb 
072 7 |a COM  |x 051000  |2 bisacsh 
082 0 4 |a 005.1  |2 22 
049 |a UAMI 
100 1 |a Eilam, Eldad. 
245 1 0 |a Reversing :  |b secrets of reverse engineering /  |c Eldad Eilam ; [foreword by Elliot Chikofsky]. 
260 |a Indianapolis, IN :  |b Wiley,  |c ©2005. 
300 |a 1 online resource (xxviii, 589 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
340 |g polychrome  |2 rdacc 
340 |p illustration  |2 rdaill 
347 |a text file  |2 rdaft 
588 0 |a Print version record. 
505 0 |a Part I: Reversing 101. Chapter 1: Foundations -- Chapter 2: Low-Level Software -- Chapter 3: Windows Fundamentals -- Chapter 4: Reversing Tools -- Part II: Applied Reversing. Chapter 5: Beyond the Documentation -- Chapter 6: Deciphering File Formats -- Chapter 7: Auditing Program Binaries -- Chapter 8: Reversing Malware -- Part III: Cracking. Chapter 9: Piracy and Copy Protection -- Chapter 10: Antireversing Techniques -- Chapter 11: Breaking Protections -- Part IV: Beyond Disassembly. Chapter 12: Reversing .NET -- Chapter 13: Decompilation -- Appendix A: Deciphering Code Structures -- Appendix B: Understanding Compiled Arithmetic -- Appendix C: Deciphering Program Data. 
520 |a Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse-engineering, delving into "disassembly," code-level reverse engineering, and explains how to decipher assembly language. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Software engineering. 
650 0 |a Reverse engineering. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Génie logiciel. 
650 6 |a Rétro-ingénierie. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Programming  |x General.  |2 bisacsh 
650 7 |a Software engineering.  |2 blmlsh 
650 7 |a Reverse engineering.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer security  |2 fast 
650 7 |a Reverse engineering  |2 fast 
650 7 |a Software engineering  |2 fast 
700 1 |a Chikofsky, Elliot J. 
776 0 8 |i Print version:  |a Eilam, Eldad.  |t Reversing.  |d Indianapolis, IN : Wiley, ©2005  |z 9780764574818  |w (DLC) 2005921595 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780764574818/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21623013 
938 |a Books 24x7  |b B247  |n bks00036457 
938 |a EBL - Ebook Library  |b EBLB  |n EBL227440 
938 |a ebrary  |b EBRY  |n ebr10113939 
938 |a EBSCOhost  |b EBSC  |n 130978 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 25581 
994 |a 92  |b IZTAP