MARC details
000 -LEADER |
fixed length control field |
03207cam a22003857a 4500 |
001 - CONTROL NUMBER |
control field |
13858098 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230528012705.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
050201s2005 inua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2005921595 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0764574817 |
Qualifying information |
paperback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780764574818 |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocm60359199 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
HF9 |
Transcribing agency |
HF9 |
Modifying agency |
IXA |
-- |
JRZ |
-- |
EG-CaTKH |
Language of cataloging |
eng |
Description conventions |
rda |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.758 |
Item number |
.E35 2005 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.1 EI.R 2005 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Eilam, Eldad, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Reversing : |
Remainder of title |
secrets of reverse engineering / |
Statement of responsibility, etc. |
Eldad Eilam. |
264 1# - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer |
Wiley Publishing, Inc, |
Date of production, publication, distribution, manufacture, or copyright notice |
2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxviii, 595 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 #0 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part I: Reversing 101. Chapter 1: Foundations -- Chapter 2: Low-Level Software -- Chapter 3: Windows Fundamentals -- Chapter 4: Reversing Tools -- Part II: Applied Reversing. Chapter 5: Beyond the Documentation -- Chapter 6: Deciphering File Formats -- Chapter 7: Auditing Program Binaries -- Chapter 8: Reversing Malware -- Part III: Cracking. Chapter 9: Piracy and Copy Protection -- Chapter 10: Antireversing Techniques -- Chapter 11: Breaking Protections -- Part IV: Beyond Disassembly. Chapter 12: Reversing .NET -- Chapter 13: Decompilation -- Appendix A: Deciphering Code Structures -- Appendix B: Understanding Compiled Arithmetic -- Appendix C: Deciphering Program Data. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse-engineering, delving into "disassembly," code-level reverse engineering, and explains how to decipher assembly language. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Software engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Reverse engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=227440&query=reversing">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=227440&query=reversing</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
20220111 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |