L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBNLes informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
If you want to know how something works, you take it apart verycarefully. That′s exactly what this book shows you how todeconstruct software in a way that reveals design andimplementation details, sometimes even source code. Why? Becausereversing reveals weak spots, so you can target your securityefforts. Because you can reverse–engineer malicious code in orderto neutralize it. Because understanding what makes a program worklets you build a better one. You′ll learn how here.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Frais de port :
EUR 2,46
Vers Etats-Unis
Description du livre Etat : New. N° de réf. du vendeur 2425384-n
Description du livre Paperback. Etat : new. New. Fast Shipping and good customer service. N° de réf. du vendeur Holz_New_0764574817
Description du livre Paperback. Etat : new. New Copy. Customer Service Guaranteed. N° de réf. du vendeur think0764574817
Description du livre Etat : New. Brand New. N° de réf. du vendeur 0764574817
Description du livre Etat : new. N° de réf. du vendeur e9f4bfa46ed9970fbcbef52a119c7841
Description du livre paperback. Etat : New. Language: ENG. N° de réf. du vendeur 9780764574818
Description du livre Paperback. Etat : new. Paperback. Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language Beginning with a basic primer on reverse engineering including computer internals, operating systems, and assembly language and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9780764574818
Description du livre Etat : New. In. N° de réf. du vendeur ria9780764574818_new
Description du livre Etat : New. N° de réf. du vendeur 2425384-n
Description du livre Paperback. Etat : Brand New. illustrated edition. 624 pages. 9.25x7.50x1.50 inches. In Stock. N° de réf. du vendeur __0764574817