x86 Software Reverse-Engineering, Cracking, and Counter-Measures 267934

Паперова книга
x86 Software Reverse-Engineering, Cracking, and Counter-Measures - фото 1

Все про “x86 Software Reverse-Engineering, Cracking, and Counter-Measures”

Від видавця

A crystal-clear and practical blueprint to software disassembly
x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required.
The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world’s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we’ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively.
  • Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions
  • Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools
  • Cracking: patching, key checkers, key generators, resource hacking, dependency walking
  • Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation
A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.
About the Author
STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel’s wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.
CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world’s first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.



Всі характеристики

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Безкоштовна доставка від 3000 грн
Схожі товари
Кібербезпека. Стратегії атак і оборони
Юрий ДиогенесЭрдаль Озкайя
833 ₴980 ₴
Grokking Web Application Security
Malcolm McDonald
980 ₴
Spring Security in Action, Second Edition 2nd Edition
Laurentiu Spilca
1'100 ₴
Cryptography and Cryptanalysis in Java. 1st Ed.
Stefania Loredana Nita, Marius Iulian Mihailescu
1'500 ₴
Snowflake Security: Securing Your Snowflake Data Cloud. 1st Ed.
Ben Herzberg, Yoav Cohen
1'500 ₴
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin PillayMohammed Abutheraa
1'500 ₴
Phishing and Communication Channels. A Guide to Identifying and Mitigating Phishing Attacks. 1st Ed.
Gunikhan Sonowal
1'600 ₴
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross Anderson
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
Andrew Martin, Michael Hausenblas
2'100 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴