Your cart is empty
Publisher | John Wiley & Sons Inc (US) |
Author(s) | Bruce Dang / Alexandre Gazet / Elias Bachaalany / Sébastien Josse |
Subtitle | x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation |
Edition | 1 |
Published | 7th February 2014 |
Related course codes |
x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Analyzing how hacks are done, so as to stop them in the
future
Reverse engineering is the process of analyzing hardware or
software and understanding it, without having access to the source
code or design documents. Hackers are able to reverse engineer
systems and exploit what they find with scary results. Now the good
guys can use the same tools to thwart these threats. Practical
Reverse Engineering goes under the hood of reverse engineering
for security analysts, security engineers, and system programmers,
so they can learn how to use these same processes to stop hackers
in their tracks.
The book covers x86, x64, and ARM (the first book to cover all
three); Windows kernel-mode code rootkits and drivers; virtual
machine protection techniques; and much more. Best of all, it
offers a systematic approach to the material, with plenty of
hands-on exercises and real-world examples.
Practical Reverse Engineering: Using x86, x64, ARM, Windows
Kernel, and Reversing Tools provides crucial, up-to-date
guidance for a broad range of IT professionals.