Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary r...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2014
|
Schlagworte: | |
Online-Zugang: | UPA01 |
Zusammenfassung: | Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (XXVI, 355 Seiten) |
ISBN: | 9781118787250 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043607420 | ||
003 | DE-604 | ||
005 | 20220916 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118787250 |9 978-1-118-78725-0 | ||
035 | |a (ZDB-30-PQE)EBC1629173 | ||
035 | |a (ZDB-89-EBL)EBL1629173 | ||
035 | |a (ZDB-38-EBR)ebr10837612 | ||
035 | |a (OCoLC)874161575 | ||
035 | |a (DE-599)BVBBV043607420 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Dang, Bruce |e Verfasser |0 (DE-588)1265722315 |4 aut | |
245 | 1 | 0 | |a Practical Reverse Engineering |b x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |c Bruce Dang ; Alexandre Gazet ; Elias Bachaalany with contributions by Sébastien Josse |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online-Ressource (XXVI, 355 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals | ||
650 | 4 | |a Reverse engineering | |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Gazet, Alexandre |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)1265722501 |4 oth | |
700 | 1 | |a Bachaalany, Elias |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)1265722641 |4 oth | |
700 | 1 | |a Josse, Sébastien |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Dang, Bruce |t Practical Reverse Engineering : x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |z 978-1-118-78731-1 |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029021479 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://ebookcentral.proquest.com/lib/uni-passau/detail.action?docID=1629173 |l UPA01 |p ebook |q UPA_Einzelkauf_2022 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176354260811776 |
---|---|
any_adam_object | |
author | Dang, Bruce |
author_GND | (DE-588)1265722315 (DE-588)1265722501 (DE-588)1265722641 |
author_facet | Dang, Bruce |
author_role | aut |
author_sort | Dang, Bruce |
author_variant | b d bd |
building | Verbundindex |
bvnumber | BV043607420 |
classification_rvk | ST 277 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1629173 (ZDB-89-EBL)EBL1629173 (ZDB-38-EBR)ebr10837612 (OCoLC)874161575 (DE-599)BVBBV043607420 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03870nmm a2200529zc 4500</leader><controlfield tag="001">BV043607420</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220916 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118787250</subfield><subfield code="9">978-1-118-78725-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1629173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1629173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10837612</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874161575</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043607420</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dang, Bruce</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1265722315</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical Reverse Engineering</subfield><subfield code="b">x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation</subfield><subfield code="c">Bruce Dang ; Alexandre Gazet ; Elias Bachaalany with contributions by Sébastien Josse</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXVI, 355 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reverse engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gazet, Alexandre</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1265722501</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bachaalany, Elias</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1265722641</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Josse, Sébastien</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Dang, Bruce</subfield><subfield code="t">Practical Reverse Engineering : x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation</subfield><subfield code="z">978-1-118-78731-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029021479</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/uni-passau/detail.action?docID=1629173</subfield><subfield code="l">UPA01</subfield><subfield code="p">ebook</subfield><subfield code="q">UPA_Einzelkauf_2022</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043607420 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781118787250 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029021479 |
oclc_num | 874161575 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 1 Online-Ressource (XXVI, 355 Seiten) |
psigel | ZDB-30-PQE ZDB-38-ESG ebook UPA_Einzelkauf_2022 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Dang, Bruce Verfasser (DE-588)1265722315 aut Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang ; Alexandre Gazet ; Elias Bachaalany with contributions by Sébastien Josse Indianapolis, Ind. Wiley 2014 © 2014 1 Online-Ressource (XXVI, 355 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals Reverse engineering Reverse Engineering (DE-588)4391935-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s 1\p DE-604 Reverse Engineering (DE-588)4391935-2 s 2\p DE-604 Gazet, Alexandre ca. 20./21. Jh. Sonstige (DE-588)1265722501 oth Bachaalany, Elias ca. 20./21. Jh. Sonstige (DE-588)1265722641 oth Josse, Sébastien Sonstige oth Erscheint auch als Druck-Ausgabe Dang, Bruce Practical Reverse Engineering : x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 978-1-118-78731-1 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Dang, Bruce Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Reverse engineering Reverse Engineering (DE-588)4391935-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4391935-2 (DE-588)4010452-7 |
title | Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |
title_auth | Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |
title_exact_search | Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |
title_full | Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang ; Alexandre Gazet ; Elias Bachaalany with contributions by Sébastien Josse |
title_fullStr | Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang ; Alexandre Gazet ; Elias Bachaalany with contributions by Sébastien Josse |
title_full_unstemmed | Practical Reverse Engineering x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang ; Alexandre Gazet ; Elias Bachaalany with contributions by Sébastien Josse |
title_short | Practical Reverse Engineering |
title_sort | practical reverse engineering x86 x64 arm windows kernel reversing tools and obfuscation |
title_sub | x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |
topic | Reverse engineering Reverse Engineering (DE-588)4391935-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Reverse engineering Reverse Engineering Computerkriminalität |
work_keys_str_mv | AT dangbruce practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation AT gazetalexandre practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation AT bachaalanyelias practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation AT jossesebastien practicalreverseengineeringx86x64armwindowskernelreversingtoolsandobfuscation |