買這商品的人也買了...
-
$980$774 -
$800$632 -
$590$466 -
$680$537 -
$750$675 -
$560$504 -
$750$593 -
$780$616 -
$490$382 -
$990$782 -
$1,570$1,492 -
$2,320$2,204 -
$650$507 -
$580$452 -
$620$527 -
$750$593 -
$590$460 -
$560$437 -
$880$748 -
$780$616 -
$580$522 -
$620$490 -
$780$702 -
$1,620Hacking: The Art of Exploitation, 2/e (Paperback)
-
$580$458
相關主題
商品描述
Description:
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Table of Contents:
Foreword.
Acknowledgments.
Introduction.
Part I: Reversing 101.
Chapter 1: Foundations.
Chapter 2: Low-Level Software.
Chapter 3: Windows Fundamentals.
Chapter 4: Reversing Tools.
Part II: Applied Reversing.
Chapter 5: Beyond the Documentation.
Chapter 6: Deciphering File Formats.
Chapter 7: Auditing Program Binaries.
Chapter 8: Reversing Malware.
Part III: Cracking.
Chapter 9: Piracy and Copy Protection.
Chapter 10: Antireversing Techniques.
Chapter 11: Breaking Protections.
Part IV: Beyond Disassembly.
Chapter 12: Reversing .NET.
Chapter 13: Decompilation.
Appendix A: Deciphering Code Structures.
Appendix B: Understanding Compiled Arithmetic.
Appendix C: Deciphering Program Data.
Index.
商品描述(中文翻譯)
描述:
從基礎的逆向工程入門開始,包括計算機內部結構、操作系統和組合語言,然後討論逆向工程的各種應用,本書為讀者提供了實用而深入的軟件逆向工程技術。本書分為兩部分,第一部分涉及與安全相關的逆向工程,第二部分探討了逆向工程的更實用方面。此外,作者還解釋了如何逆向工程第三方軟件庫以改進接口,以及如何逆向工程競爭對手的軟件以建立更好的產品。
* 第一本展示軟件逆向工程如何幫助防禦安全威脅、加快開發速度並揭示競爭產品秘密的流行書籍
* 通過演示黑客如何利用逆向工程技術破解複製保護方案並識別軟件目標以及其他惡意軟件,幫助開發人員修補安全漏洞
* 提供高級逆向工程入門指南,深入探討“反彙編”-代碼級逆向工程-並解釋如何解讀組合語言
目錄:
前言。
致謝。
引言。
第一部分:逆向工程101。
第1章:基礎。
第2章:低級軟件。
第3章:Windows基礎知識。
第4章:逆向工程工具。
第二部分:應用逆向工程。
第5章:超越文檔。
第6章:解讀文件格式。
第7章:審計程序二進制文件。
第8章:逆向工程惡意軟件。
第三部分:破解。
第9章:盜版和複製保護。
第10章:反逆向工程技術。
第11章:破解保護。
第四部分:超越反彙編。
第12章:逆向工程.NET。
第13章:反編譯。
附錄A:解讀代碼結構。
附錄B:理解編譯算術。
附錄C:解讀程序數據。
索引。