x86 Software Reverse-Engineering, Cracking, and Counter-Measures 267934

Паперова книга
267934
x86 Software Reverse-Engineering, Cracking, and Counter-Measures - фото 1
1'700
Купити

Все про “x86 Software Reverse-Engineering, Cracking, and Counter-Measures”

Від видавця

A crystal-clear and practical blueprint to software disassembly
x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required.
The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world’s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we’ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively.
  • Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions
  • Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools
  • Cracking: patching, key checkers, key generators, resource hacking, dependency walking
  • Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation
A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.
About the Author
STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel’s wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.
CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world’s first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.

Рецензії

0

Всі характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Рік
    2024
  • Сторінок
    320
  • Формат
    190х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
  • Безкоштовна доставка від 3'000,00 ₴
Вас може зацікавити
Лямбда-вирази в Java 8
14260
Ричард Уорбертон
380 ₴
Совершенный алгоритм. Комплект из 4 книг
236550
Тим Рафгарден
1'707 ₴1'760 ₴
Domain Storytelling + Strategic Monoliths and Microservices + Continuous Architecture in Practice. Комплект из трех книг
246899
Vaughn VernonStefan HoferHenning SchwentnerTomasz JaskulaEoin WoodsMurat ErderPierre Pureur
2'157 ₴2'370 ₴
Персонально для вас
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
303258
Jasper van WoudenbergColin O'Flynn
1'200 ₴
Cryptography and Cryptanalysis in Java. 1st Ed.
244673
Stefania Loredana Nita, Marius Iulian Mihailescu
1'500 ₴
Snowflake Security: Securing Your Snowflake Data Cloud. 1st Ed.
244728
Ben Herzberg, Yoav Cohen
1'500 ₴
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
263204
Rishalin PillayMohammed Abutheraa
1'500 ₴
Phishing and Communication Channels. A Guide to Identifying and Mitigating Phishing Attacks. 1st Ed.
244713
Gunikhan Sonowal
1'600 ₴
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
281535
Marius Sandbu
1'600 ₴
Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques
281536
Muhiballah Mohammed
1'600 ₴
Spring Security - Fourth Edition: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures 4th ed. Edition
283679
Badr Nasslahsen
1'600 ₴
Supply Chain Software Security: AI, IoT, and Application Security First Edition
292940
Aamiruddin Syed
1'600 ₴
Security Engineering: A Guide to Building Dependable Distributed Systems
195459
Ross Anderson
1'700 ₴
Certified Kubernetes Security Specialist (CKS) Study Guide: In-Depth Guidance and Practice 1st Edition
273946
Benjamin Muschko
1'700 ₴
Docker: Up & Running; Shipping Reliable Containers in Production 3rd Edition
274003
Sean KaneKarl Matthias
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Web Application Security: Exploitation and Countermeasures for Modern Web Applications 2nd Edition
275577
Andrew Hoffman
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
275838
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
280687
David Senecal
1'800 ₴