Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (Paperback)
Bruce Dang
- 出版商: Wiley
- 出版日期: 2014-02-17
- 售價: $2,030
- 貴賓價: 9.5 折 $1,929
- 語言: 英文
- 頁數: 384
- 裝訂: Paperback
- ISBN: 1118787315
- ISBN-13: 9781118787311
-
相關翻譯:
逆向工程實戰 (Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscatio) (簡中版)
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$1,980The Tao Of Network Security Monitoring: Beyond Intrusion Detection
-
$1,558Introduction to Algorithms, 3/e (IE-Paperback)
-
$1,584Applied Security Visualization (Paperback)
-
$2,210$2,100 -
$580$493 -
$580$458 -
$680$530 -
$990Structured Parallel Programming: Patterns for Efficient Computation (Paperback)
-
$300$234 -
$300$234 -
$1,188The Java Language Specification, Java SE 7 Edition (Paperback)
-
$1,130$961 -
$300$234 -
$400$380 -
$831$788 -
$735Unmasking the Social Engineer: The Human Element of Security (Paperback)
-
$1,650$1,568 -
$680$578 -
$520$406 -
$490$417 -
$490$417 -
$780$616 -
$880$695 -
$600$468 -
$520$411
相關主題
商品描述
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
- Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
- Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
- Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
- Demystifies topics that have a steep learning curve
- Includes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
商品描述(中文翻譯)
「分析黑客的攻擊方式,以便在未來阻止它們」
逆向工程是分析硬體或軟體並理解其運作的過程,而不需要存取原始碼或設計文件。黑客能夠逆向工程系統並利用他們發現的漏洞,造成可怕的後果。現在,善意的人也可以使用相同的工具來阻止這些威脅。《實用逆向工程》深入探討逆向工程的內幕,針對安全分析師、安全工程師和系統程式設計師,讓他們學習如何使用這些過程來阻止黑客的攻擊。
本書涵蓋了x86、x64和ARM(首本涵蓋全部三者的書籍);Windows核心模式代碼的rootkit和驅動程式;虛擬機保護技術等等。最重要的是,本書提供了一種系統化的方法,並提供了大量的實際練習和真實案例。
本書特點包括:
- 提供了一種系統化的方法來理解逆向工程,並提供了實際練習和真實案例
- 涵蓋了x86、x64和先進的RISC機器(ARM)架構,以及去混淆和虛擬機保護技術
- 特別介紹了Windows核心模式代碼(rootkit/驅動程式),這是其他書籍很少涵蓋的主題,並解釋了如何逐步分析驅動程式
- 解密了學習曲線陡峭的主題
- 包含了一個關於逆向工程工具的額外章節
《實用逆向工程:使用x86、x64、ARM、Windows核心和逆向工程工具》為廣大IT專業人士提供了重要且最新的指導。