Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
-10% $39.77$39.77
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$14.00$14.00
Ships from: Amazon Sold by: Ba's Books
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Reversing: Secrets of Reverse Engineering 1st Edition
Purchase options and add-ons
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
- ISBN-100764574817
- ISBN-13978-0764574818
- Edition1st
- PublisherWiley
- Publication dateApril 15, 2005
- LanguageEnglish
- Dimensions7.4 x 1.3 x 9.2 inches
- Print length624 pages
Frequently bought together

Similar items that may deliver to you quickly
Editorial Reviews
From the Inside Flap
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows youhow to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and when and whyit may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
Companion Web site
Visit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
From the Back Cover
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and when and why it may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
Companion Web site
Visit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
About the Author
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.
Product details
- Publisher : Wiley; 1st edition (April 15, 2005)
- Language : English
- Paperback : 624 pages
- ISBN-10 : 0764574817
- ISBN-13 : 978-0764574818
- Item Weight : 2.31 pounds
- Dimensions : 7.4 x 1.3 x 9.2 inches
- Best Sellers Rank: #687,863 in Books (See Top 100 in Books)
- #708 in Software Development (Books)
- #1,901 in Computer Software (Books)
- #21,046 in Unknown
- Customer Reviews:
About the authors

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Having a fair bit of reverse engineering experience myself, I have found this book to be extremely concise and detaild -- and I have learned a fair bit of new material while reading it.
There is no dull moment in this book. The author (who is clearly a gifted writer) explains reverse-engineering-related topics in a fascinating and unique manner, and, within this work, he actually cements the way in which reverse engineering should always be taught. Written by a true master, the book is very pedagogic; every chapter is accompanied by detailed examples -- which make the discussed topics crystal-clear.
I would have given this book more than five stars, had I been able to -- and I can recommend it to every software deveopler without a trace of hesitation; actually, it is now that I have bought an additional copy as a gift to a friend. Rest assured that this book will be a crucial part in your collection of tech books, just like it is in mine.
To sum it all up (and as it becomes clear from the above written): I think that this book is a magnificent work of art (no less), and I would even dare to say that I enjoyed it more than any tech book I ever owned. With all the aforementioned complements and my vain attempts to describe the magnificence of this work, words still can't fully do justice to this book. HIGHLY RECOMMENDED.
I picked up this book to get better at exploiting software, and was not disappointed. However, this is not a book about exploit development. If anything, it is a book about software cracking, complete with a 50 page walkthrough of an intermediate level protection scheme. The chapter on finding security vulnerabilities is actually very weak, as is the chapter on malware analysis. Despite this, I was not disappointed because the fundamental reversing skills acquired by working through this book are also invaluable base skills for exploit development.
My main gripe with this book is it's sole focus on the Windows x86 evironment. I would expect a hypothetical second edition to include many pages on reversing x86-64 code, as well as a chapter on Android and iOS reversing.
My work invloves using some software for modeling transportation systems but most of the time the details of the underlying models that software relies on are not well documented. The information in this book helps me quickly learn how to reverse and get the information I want to know. Besides this book is very well written thus very enjoyable to read. In this regard, I would like to say - as an extra bonus I learned a lot from the author's writing ! (Sure, English is not my native lanuage but I have to write a lot technical reports in English for my daily work)
I love this book. Highly recommended!
This text will please even the moderately advanced programmer, although the first quarter or so might seem like too much review for the Windows C++ programmer. The .NET programmer will really benefit, though, since the focus through the Windows layers and into machine code will reveal a lot to the high-level person who hasn't yet had a chance to delve into 'internals.'
I think the book serves as a "pro" book for someone with C++/Windows experience by tying things together and moving to its reversing core while at the same time serving as an "intermediate" book, ironically, for the high-level programmer who will read it more for a qualitative comprehension and have to go out and read more 'internals' books (like Jeff Richter's books) if interested in deeper understanding.
Top reviews from other countries
Non fatevi ingannare dall’anno di scrittura di questo manuale, i contenuti sono comunque ancora validi e di grande valore.
Una chicca: vengono descritti i ransomware e crypto locker (seppure con altro nome) con molti anni di anticipo rispetto alla loro effettiva comparsa avvenuta solo recentemente.









