Practical Reverse Engineering
x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
|Price||$40.99 - $52.91
|Authors||Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse|
|Format||Paper book / ebook (PDF)|
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
4 5 137
by Reginald Wong
If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its so...
Price: $44.99 | Publisher: Packt Publishing | Release: 2018
by Ilya Shpigor
Develop and use bots in video gaming to automate game processes and see possible ways to avoid this kind of automation. This book explains how bots can be very helpful in games such as multiplayer online games, both for training your character and for automating repetitious game processes in order to start a competition with human opponen...
Price: $34.99 | Publisher: Apress | Release: 2018
by Dennis Andriesse
As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out - binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs ...
Price: $29.99 | Publisher: No Starch Press | Release: 2018
by Harold Timmis
Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. It's essential to institute a proper design, device instrumentation and, indeed, test your project thoroughly before committing to a particular prototype. Each...
Price: $12.99 | Publisher: Apress | Release: 2011
by Aditya Gupta
Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by op...
Price: $28.93 | Publisher: Apress | Release: 2019
by Shon Harris, Allen Harper, Jonathan Ness, Terron Williams, Gideon Lenkey
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks...
Publisher: McGraw-Hill | Release: 2011
by Joxean Koret, Elias Bachaalany
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building ...
Price: $44.32 | Publisher: Wiley | Release: 2015
by Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-t...
Price: $34.99 | Publisher: McGraw-Hill | Release: 2018