Practical Reverse Engineering (ePub)
x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
(Sprache: Englisch)
Analyzing how hacks are done, so as to stop them in the
future
Reverse engineering is the process of analyzing hardware or
software and understanding it, without having access to the source
code or design documents. Hackers are able to reverse...
future
Reverse engineering is the process of analyzing hardware or
software and understanding it, without having access to the source
code or design documents. Hackers are able to reverse...
sofort als Download lieferbar
eBook (ePub)
Fr. 42.00
inkl. MwSt.
- Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
Produktdetails
Produktinformationen zu „Practical Reverse Engineering (ePub)“
Analyzing how hacks are done, so as to stop them in the
future
Reverse engineering is the process of analyzing hardware or
software and understanding it, without having access to the source
code or design documents. Hackers are able to reverse engineer
systems and exploit what they find with scary results. Now the good
guys can use the same tools to thwart these threats. Practical
Reverse Engineering goes under the hood of reverse engineering
for security analysts, security engineers, and system programmers,
so they can learn how to use these same processes to stop hackers
in their tracks.
The book covers x86, x64, and ARM (the first book to cover all
three); Windows kernel-mode code rootkits and drivers; virtual
machine protection techniques; and much more. Best of all, it
offers a systematic approach to the material, with plenty of
hands-on exercises and real-world examples.
* Offers a systematic approach to understanding reverse
engineering, with hands-on exercises and real-world examples
* Covers x86, x64, and advanced RISC machine (ARM) architectures
as well as deobfuscation and virtual machine protection
techniques
* Provides special coverage of Windows kernel-mode code
(rootkits/drivers), a topic not often covered elsewhere, and
explains how to analyze drivers step by step
* Demystifies topics that have a steep learning curve
* Includes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows
Kernel, and Reversing Tools provides crucial, up-to-date
guidance for a broad range of IT professionals.
future
Reverse engineering is the process of analyzing hardware or
software and understanding it, without having access to the source
code or design documents. Hackers are able to reverse engineer
systems and exploit what they find with scary results. Now the good
guys can use the same tools to thwart these threats. Practical
Reverse Engineering goes under the hood of reverse engineering
for security analysts, security engineers, and system programmers,
so they can learn how to use these same processes to stop hackers
in their tracks.
The book covers x86, x64, and ARM (the first book to cover all
three); Windows kernel-mode code rootkits and drivers; virtual
machine protection techniques; and much more. Best of all, it
offers a systematic approach to the material, with plenty of
hands-on exercises and real-world examples.
* Offers a systematic approach to understanding reverse
engineering, with hands-on exercises and real-world examples
* Covers x86, x64, and advanced RISC machine (ARM) architectures
as well as deobfuscation and virtual machine protection
techniques
* Provides special coverage of Windows kernel-mode code
(rootkits/drivers), a topic not often covered elsewhere, and
explains how to analyze drivers step by step
* Demystifies topics that have a steep learning curve
* Includes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows
Kernel, and Reversing Tools provides crucial, up-to-date
guidance for a broad range of IT professionals.
Autoren-Porträt von Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse
Bruce Dang is a senior security development engineering lead at Microsoft focusing on Windows kernel and reverse engineering.Alexandre Gazet is a senior security researcher at QuarksLab focusing on reverse engineering and software protection.
Elias Bachaalany is a software security engineer at Microsoft.
Bibliographische Angaben
- Autoren: Bruce Dang , Alexandre Gazet , Elias Bachaalany , Sébastien Josse
- 2014, 1. Auflage, 384 Seiten, Englisch
- Verlag: John Wiley & Sons
- ISBN-10: 1118787390
- ISBN-13: 9781118787397
- Erscheinungsdatum: 03.02.2014
Abhängig von Bildschirmgrösse und eingestellter Schriftgrösse kann die Seitenzahl auf Ihrem Lesegerät variieren.
eBook Informationen
- Dateiformat: ePub
- Grösse: 3.27 MB
- Mit Kopierschutz
Sprache:
Englisch
Kopierschutz
Dieses eBook können Sie uneingeschränkt auf allen Geräten der tolino Familie lesen. Zum Lesen auf sonstigen eReadern und am PC benötigen Sie eine Adobe ID.
Kommentar zu "Practical Reverse Engineering"
0 Gebrauchte Artikel zu „Practical Reverse Engineering“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Practical Reverse Engineering".
Kommentar verfassen