- Amazon Business: Make the most of your Amazon Business account with exclusive tools and savings. Login now
- Amazon Business : For business-only pricing, quantity discounts and FREE Shipping. Register a free business account
Reversing: Secrets of Reverse Engineering 1st Edition
|
Eldad Eilam
(Author)
Find all the books, read about the author, and more.
See search results for this author
Are you an author?
Learn about Author Central
|
Use the Amazon App to scan ISBNs and compare prices.
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
-
Apple
-
Android
-
Windows Phone
-
Android
|
Download to your computer
|
Kindle Cloud Reader
|
Frequently bought together
Customers who viewed this item also viewed
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and ObfuscationPaperback
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwarePaperback
The Ghidra Book: The Definitive GuidePaperback
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd EditionPaperback
The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular DisassemblerPaperback
xchg rax,raxPaperback
Customers who bought this item also bought
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and ObfuscationPaperback
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwarePaperback
The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular DisassemblerPaperback
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd EditionPaperback
The Ghidra Book: The Definitive GuidePaperback
Hacking: The Art of Exploitation, 2nd EditionPaperback
Special offers and product promotions
Editorial Reviews
From the Inside Flap
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows youhow to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and when and whyit may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
Companion Web site Visit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
From the Back Cover
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you―how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and when ―and why―it may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
Companion Web site Visit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
About the Author
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.
Don't have a Kindle? Compra tu Kindle aquí, or download a FREE Kindle Reading App.
Product details
- Publisher : Wiley; 1st edition (April 15, 2005)
- Language : English
- Paperback : 624 pages
- ISBN-10 : 0764574817
- ISBN-13 : 978-0764574818
- Item Weight : 2.4 pounds
- Dimensions : 7.4 x 1.4 x 9.2 inches
-
Best Sellers Rank:
#484,259 in Books (See Top 100 in Books)
- #329 in Software Design & Engineering
- #958 in Software Development (Books)
- #2,068 in Computer Software (Books)
- Customer Reviews:
Customer reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
This text will please even the moderately advanced programmer, although the first quarter or so might seem like too much review for the Windows C++ programmer. The .NET programmer will really benefit, though, since the focus through the Windows layers and into machine code will reveal a lot to the high-level person who hasn't yet had a chance to delve into 'internals.'
I think the book serves as a "pro" book for someone with C++/Windows experience by tying things together and moving to its reversing core while at the same time serving as an "intermediate" book, ironically, for the high-level programmer who will read it more for a qualitative comprehension and have to go out and read more 'internals' books (like Jeff Richter's books) if interested in deeper understanding.
My work invloves using some software for modeling transportation systems but most of the time the details of the underlying models that software relies on are not well documented. The information in this book helps me quickly learn how to reverse and get the information I want to know. Besides this book is very well written thus very enjoyable to read. In this regard, I would like to say - as an extra bonus I learned a lot from the author's writing ! (Sure, English is not my native lanuage but I have to write a lot technical reports in English for my daily work)
I love this book. Highly recommended!
Top reviews from other countries
It is very easy to read and goes straight to the point, I love it!
I'm just giving it 4 starts (it should be 5 some years ago) because the author should update some aspects and add some information on new ways of cracking applications, and focus a bit more on the new .NET frameworks. So basically the book could be updated.
But besides that, I had a e-copy of this book before buying it so I already know this, and still I bought it because this book is VERY GOOD, IT IS AMAZING REALLY!!! Because even knowing it is a bit (not totally, not even half) out of date, the core of reverse engineering is well covered by the book, and knowing this you can update yourself alone without much trouble!
This book is a MUST!

