000 03207cam a22003857a 4500
001 13858098
005 20230528012705.0
008 050201s2005 inua 001 0 eng d
010 _a 2005921595
020 _a0764574817
_qpaperback
020 _a9780764574818
_qpaperback
035 _a(OCoLC)ocm60359199
040 _aHF9
_cHF9
_dIXA
_dJRZ
_dEG-CaTKH
_beng
_erda
042 _alccopycat
050 0 0 _aQA76.758
_b.E35 2005
082 0 0 _a005.1 EI.R 2005
_223
100 1 _aEilam, Eldad,
_eauthor.
245 1 0 _aReversing :
_bsecrets of reverse engineering /
_cEldad Eilam.
264 1 _aIndianapolis, IN :
_bWiley Publishing, Inc,
_c2005.
300 _axxxviii, 595 pages :
_billustrations ;
_c24 cm.
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
500 _aIncludes index.
505 0 _aPart I: Reversing 101. Chapter 1: Foundations -- Chapter 2: Low-Level Software -- Chapter 3: Windows Fundamentals -- Chapter 4: Reversing Tools -- Part II: Applied Reversing. Chapter 5: Beyond the Documentation -- Chapter 6: Deciphering File Formats -- Chapter 7: Auditing Program Binaries -- Chapter 8: Reversing Malware -- Part III: Cracking. Chapter 9: Piracy and Copy Protection -- Chapter 10: Antireversing Techniques -- Chapter 11: Breaking Protections -- Part IV: Beyond Disassembly. Chapter 12: Reversing .NET -- Chapter 13: Decompilation -- Appendix A: Deciphering Code Structures -- Appendix B: Understanding Compiled Arithmetic -- Appendix C: Deciphering Program Data.
520 _aBeginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse-engineering, delving into "disassembly," code-level reverse engineering, and explains how to decipher assembly language.
650 0 _aSoftware engineering.
650 0 _aReverse engineering.
650 0 _aComputer security.
856 4 1 _uhttps://ebookcentral.proquest.com/lib/coventry/detail.action?docID=227440&query=reversing
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
998 _ahuda.mahmoud
_bM
_d20220111
999 _c292
_d292