Reversing : secrets of reverse engineering / Eldad Eilam.
Publisher: Indianapolis, IN : Wiley, 2005Copyright date: ©2005Description: xxxviii, 595 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 0764574817
- 9780764574818
| Item type | Current library | Home library | Collection | Call number | Materials specified | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|---|---|
| AM | PERPUSTAKAAN TUN SERI LANANG | PERPUSTAKAAN TUN SERI LANANG KOLEKSI AM-P. TUN SERI LANANG (ARAS 5) | - | QA76.758.E385 (Browse shelf(Opens below)) | 1 | Available | 00002162460 |
Browsing PERPUSTAKAAN TUN SERI LANANG shelves, Shelving location: KOLEKSI AM-P. TUN SERI LANANG (ARAS 5) Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.758.C72 People and project management for it | QA76.758.D37 C : a software engineering approach / | QA76.758.D478 Designing software-intensive systems : methods and principles / | QA76.758.E385 Reversing : secrets of reverse engineering / | QA76.758.F55 Software engineering and CASE : bridging and culture gap / | QA76.758.F66 Introducing software engineering / | QA76.758.G474 2003 Fundamentals of software engineering / |
Includes index.
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse-engineering, delving into'disassembly,' code-level reverse engineering, and explains how to decipher assembly language.
There are no comments on this title.
