Reversing Secrets of Reverse Engineering
来源:互联网 发布:淘宝客服的意义 编辑:程序博客网 时间:2024/05/06 16:27
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
http://rapidshare.com/files/27773043/I0764574817.rar
http://rapidshare.com/files/27773043/I0764574817.rar
- Reversing - Secrets of Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Reversing Secrets of Reverse Engineering
- Wiley.Reversing.Secrets.of.Reverse.Engineering.Apr.2005.eBook-DDU
- Reversing: Secrect of Reverse Engineering by Wiley
- the bug of MyEclipse Hibernate Reverse Engineering
- Android Reversing Engineering II
- Reverse engineering
- Scan of the Month 33: Anti Reverse Engineering Uncovered
- Reverse engineering of Object Oriented Cod Monograph Computer Science
- The task of making reverse engineering difficult is not easy.
- CrowdStrike unleashes CrowdRE to promote collaborative reverse engineering of malware
- Reverse engineering the ARM1, ancestor of the iPhone's processor
- On Software Reverse Engineering
- linux reverse code engineering
- Reverse-Engineering Malware
- Reverse engineering DotNetNuke skin
- Reverse Engineering with LD_PRELOAD
- Developer's Workshop to COM and ATL 3.0
- Bitter EJB
- Professional ASP.NET 2.0
- Multimedia Content and the Semantic Web: Standards, Methods and Tools
- Reverse engineering of Object Oriented Cod Monograph Computer Science
- Reversing Secrets of Reverse Engineering
- Resource Allocation in Project Management
- Instant SQL Server 2000 Applications
- LDAP in the Solaris™ Operating Environment: Deploying Secure Directory Services
- Cases on Information Technology: Lessons Learned
- Software Architecture in Practice, Second Edition
- DNS on Windows Server 2003 (3rd edition)
- SQL Server Security Distilled (2nd edition)
- Advanced Topics in Information Resources Management