Text books, scientific books, etc
Dec 19th, 2006, 12:48 pm
Wiley - Reversing Secrets of Reverse Engineering
Requirements: PDF Reader
Overview:
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

Image

Here is a brief listing of some of the topics discussed throughout this book:
- Assembly language for IA-32 compatible processors and how to read compiler-generated assembly language code.
- Operating systems internals and how to reverse engineer an operating system.
- Reverse engineering on the .NET platform, including an introduction to the .NET development platform and its assembly language: MSIL.
- Data reverse engineering: how to decipher an undocumented file-format or network protocol.
- The legal aspects of reverse engineering: when is it legal and when is it not?
- Copy protection and digital rights management technologies.
- How reverse engineering is applied by crackers to defeat copy protection technologies.
- Techniques for preventing people from reverse engineering code and a sober attempt at evaluating their effectiveness.
- The general principles behind modern-day malicious programs and how reverse engineering is applied to study and neutralize such programs.
- A live session where a real-world malicious program is dissected and revealed, also revealing how an attacker can communicate with the program to gain control of infected systems.
- The theory and principles behind decompilers, and their effectiveness on the various low-level languages.

Download Instructions:
Code: Select allhttp://www.megaupload.com/?d=QA62WHSO
Dec 19th, 2006, 12:48 pm
Last edited by ydaudw on Dec 19th, 2006, 4:44 pm, edited 1 time in total.
Dec 19th, 2006, 1:39 pm
#42438 by hdf
please mirror it on rapidshare :) , Thanks and please this book also Disassembling Code: IDA Pro and SoftICE

Thanks
hdf
Dec 19th, 2006, 1:39 pm

The Lord
Dec 19th, 2006, 3:54 pm
m8, i have problem uploading to Rapidshare, pls ask someone else to mirror it.

I really need to find another way to upload to rapidshare :x
Dec 19th, 2006, 3:54 pm

Image
SUPPORT AUTHORS. IF YOU LIKE IT, BUY IT.
Dec 19th, 2006, 10:51 pm
#42569 by MIW
hdf wrote:please mirror it on rapidshare :) , Thanks and please this book also Disassembling Code: IDA Pro and SoftICE

Thanks
hdf


Code: Select allhttp://rapidshare.com/files/8189254/Wiley_-_Reversing_Secrets_of_Reverse_Engineering.rar.html
Dec 19th, 2006, 10:51 pm