Reversing

Secrets of Reverse Engineering

Nonfiction, Computers, Programming, Software Development
Cover of the book Reversing by Eldad Eilam, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Eldad Eilam ISBN: 9781118079768
Publisher: Wiley Publication: December 12, 2011
Imprint: Wiley Language: English
Author: Eldad Eilam
ISBN: 9781118079768
Publisher: Wiley
Publication: December 12, 2011
Imprint: Wiley
Language: English

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

More books from Wiley

Cover of the book Reforming Long-term Care in Europe by Eldad Eilam
Cover of the book I.O.U.S.A by Eldad Eilam
Cover of the book A Practical Approach to Cardiovascular Medicine (WGF ES ePub) by Eldad Eilam
Cover of the book No Fear of Failure by Eldad Eilam
Cover of the book Advanced Control of Doubly Fed Induction Generator for Wind Power Systems by Eldad Eilam
Cover of the book Resistance, Space and Political Identities by Eldad Eilam
Cover of the book Business Hack by Eldad Eilam
Cover of the book Evidence-Based Gastroenterology and Hepatology by Eldad Eilam
Cover of the book Multiscale Analysis of Deformation and Failure of Materials by Eldad Eilam
Cover of the book From the Confucian Way to Collaborative Knowledge Co-Construction by Eldad Eilam
Cover of the book CENELEC 50128 and IEC 62279 Standards by Eldad Eilam
Cover of the book Semantic Web For Dummies by Eldad Eilam
Cover of the book Green Chemical Engineering by Eldad Eilam
Cover of the book Waste Management in the Chemical and Petroleum Industries by Eldad Eilam
Cover of the book Conservation Criminology by Eldad Eilam
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy