Reversing: Secrets of Reverse Engineering et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
ou
en essayant gratuitement Amazon Premium pendant 30 jours. Votre inscription aura lieu lors du passage de la commande. En savoir plus.
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Reversing: Secrets of Reverse Engineering sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Reversing: Secrets of Reverse Engineering [Anglais] [Broché]

Eldad Eilam
4.3 étoiles sur 5  Voir tous les commentaires (3 commentaires client)
Prix : EUR 30,55 LIVRAISON GRATUITE En savoir plus.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le mercredi 23 avril ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 22,91  
Broché EUR 30,55  

Description de l'ouvrage

15 avril 2005
Beginning with a basic primer on reverse engineering–including computer internals, operating systems, and assembly language–and then discussing the various applications of reverse engineering, this book provides readers with practical, in–depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security–related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third–party software library to improve interfacing and how to reverse engineer a competitor′s software to build a better product. ∗ The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products ∗ Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy–protection schemes and identify software targets for viruses and other malware ∗ Offers a primer on advanced reverse–engineering, delving into "disassembly"–code–level reverse engineering–and explaining how to decipher assembly language

Offres spéciales et liens associés


Produits fréquemment achetés ensemble

Reversing: Secrets of Reverse Engineering + The Shellcoder's Handbook: Discovering and Exploiting Security Holes + Hacking: The Art of Exploitation
Prix pour les trois: EUR 94,37

Certains de ces articles seront expédiés plus tôt que les autres.

Acheter les articles sélectionnés ensemble


Descriptions du produit

Quatrième de couverture

Sometimes, the best way to advance is in reverse If you want to know how something works, you take it apart very carefully. That′s exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse–engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You′ll learn how here. Learn to read compiler–generated assembly language code for IA–32 compatible processors Decipher an undocumented file format or network protocol Understand when reverse engineering is legal, and when—and why—it may not be See how hackers use reversing to defeat copy protection technology Find out how to pull the plug on malicious code Determine how to prevent others from reversing your code, and find out how effective such steps can be Explore reverse engineering on the .NET platform and its assembly language, MSIL Observe the dissection of a real–world malicious program and see how the attacker used it to control infected systems

Biographie de l'auteur

Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in–depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.

Détails sur le produit

  • Broché: 624 pages
  • Editeur : John Wiley & Sons (15 avril 2005)
  • Langue : Anglais
  • ISBN-10: 0764574817
  • ISBN-13: 978-0764574818
  • Dimensions du produit: 23,6 x 18,8 x 3,4 cm
  • Moyenne des commentaires client : 4.3 étoiles sur 5  Voir tous les commentaires (3 commentaires client)
  • Classement des meilleures ventes d'Amazon: 12.724 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  • Table des matières complète
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Première phrase
Reverse engineering is the process of extracting the knowledge or design blueprints from anything man-made. Lire la première page
En découvrir plus
Concordance
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?


Commentaires en ligne 

4 étoiles
0
2 étoiles
0
1 étoiles
0
4.3 étoiles sur 5
4.3 étoiles sur 5
Commentaires client les plus utiles
5.0 étoiles sur 5 Très bon livre 24 mai 2013
Par nestderl
Format:Broché|Achat authentifié par Amazon
Un livre d'introduction excellent.

Etant un programmeur autodidacte assez expérimenté j'ai été très satisfait par la premières parties, plutôt théoriques, du livre d'apportant des informations riches mais condensées sur les systèmes x86 et l'informatique bas niveau en général ce qui est très appréciable pour un débutant en la matière.

La pédagogie du reste du live est très agréable avec quelques chapitres théoriques suivis d'une application concrète des concepts.

Très bon livre que je conseil à tous.
Avez-vous trouvé ce commentaire utile ?
1 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 La référence 10 août 2010
Par h@ckysa
Format:Broché
C'est bel et bien, le livre a avoir pour tout reverseur en herbe. Tout y est, des préliminaires aux techniques les plus avancées
Avez-vous trouvé ce commentaire utile ?
0 internautes sur 1 ont trouvé ce commentaire utile 
Par sergehao
Format:Broché|Achat authentifié par Amazon
Il vaut mieux avoir déjà programmé en assembleur et dans un langage de haut niveau pour pouvoir tirer partie du livre. On se rend compte qu'il faut beaucoup de pratique pour faire du reverse engineering efficace, et ce livre en explique bien les bases. Par contre il ne fait pas le travail à notre place : chaque software est différent et nécessitera un jeu de techniques différentes qu'on devra avoir assimilé à force de pratique pour pouvoir mener à bien notre projet de reversing.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.6 étoiles sur 5  29 commentaires
76 internautes sur 78 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent Resource 4 juin 2005
Par Russell G. Osterlund Jr. - Publié sur Amazon.com
Format:Broché
This book is a very good introduction and instructional manual on a subject that is both relevant and shadowy. Uttering the

phrase, "reverse engineering", these days conjures up visions of crackers and other criminals breaking into websites and stealing private information. But for anyone serious about improving their programming skills, "Reversing - Secrets of Reverse Engineering" is a must read. For example, debugging and reversing activities are very close kin; you will improve your skill in tracking down and understanding bugs in your code by learning some of the techniques presented in this book.

The highlight of the book (for me) was Chapter 11 where the author presents step-by-step sessions in reversing progressively more difficult protection schemes. If you feel uncomfortable with this activity, rest assured that the author has neatly sidestepped some murky legal issues by using Internet examples created for this purpose and his own program, designed to illustrate some of the protection techniques presented in other chapters of his book. Another chapter, "Deciphering File Formats", uses this same trick by reversing an encryption program Mr. Eilam wrote for this purpose. The appendices are another valuable contribution where the discussion turns to common code patterns produced by most compilers and how to interpret and extract the last bit of information from them.

Minor nits - I wish the assembly listings were broken up to better highlight points made by the author in his discussions. It became very tedious to match addresses mentioned in his discourse with those in the listings and reduced the overall effectiveness of the material. Also, I was not able to find in the book what seemed to be bibliographical references to other works that were cited in discussions on decompilation and other

topics. But putting these small criticisms aside I highly recommend this book and wish something as comprehensive as this had been available years ago.
17 internautes sur 18 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Pure perfection. 11 avril 2010
Par Pavel Pruzhansky - Publié sur Amazon.com
Format:Broché|Achat authentifié par Amazon
I am sorry for having written this review so late. This book is a true gem; a must-have for any serious software engineer. Understanding how software works under the hood is key to writing code properly -- and this book provides an insight on that topic in an absolutely BRILLIANT MANNER.

Having a fair bit of reverse engineering experience myself, I have found this book to be extremely concise and detaild -- and I have learned a fair bit of new material while reading it.

There is no dull moment in this book. The author (who is clearly a gifted writer) explains reverse-engineering-related topics in a fascinating and unique manner, and, within this work, he actually cements the way in which reverse engineering should always be taught. Written by a true master, the book is very pedagogic; every chapter is accompanied by detailed examples -- which make the discussed topics crystal-clear.

I would have given this book more than five stars, had I been able to -- and I can recommend it to every software deveopler without a trace of hesitation; actually, it is now that I have bought an additional copy as a gift to a friend. Rest assured that this book will be a crucial part in your collection of tech books, just like it is in mine.

To sum it all up (and as it becomes clear from the above written): I think that this book is a magnificent work of art (no less), and I would even dare to say that I enjoyed it more than any tech book I ever owned. With all the aforementioned complements and my vain attempts to describe the magnificence of this work, words still can't fully do justice to this book. HIGHLY RECOMMENDED.
56 internautes sur 69 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Extremely didactic and well written, but . . . 19 avril 2005
Par Marco De Vivo - Publié sur Amazon.com
Format:Broché|Achat authentifié par Amazon
This is an extraordinarily didactic book. If you want jump inside this field ("secure code"), then take the book by the hand and go ahead.

Well written and very pedagogic, the book is useful even for experts. The only limitation (clearly stated in the back cover) is the full orientation toward the Microsoft's .NET platform (and of course the Windows/Intel realm).

Some chapters should be more deeply analyzed and the chapter 8 (Reversing Malware) is somewhat naive.

Even so, overall . . . 5 stars.

If you are in "secure code", this book is a MUST.

p.s. As an added value the book is so self-contained (no external sources needed) and so complete, that can be used as a quick but sufficient introduction to computer system architectures. To know more about the book try the "Search Inside" feature in this same page.
11 internautes sur 12 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A great tutorial for reverse engineering 13 octobre 2006
Par Y. FEI - Publié sur Amazon.com
Format:Broché|Achat authentifié par Amazon
The authour walked you through the techniques which can be used in reverse/anti-reverse software. Most of them can be applied and used when you do your own code reverse. The book also teaches you how to protect your own application from reversing.

This book isn't just a theoritcal or academic book. You can learn the practical skills from it.
20 internautes sur 25 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Interesting read, but not always accurate 27 janvier 2008
Par Rohit Singh - Publié sur Amazon.com
Format:Broché
This book is a dense collection of information about various aspects of reversing.

There are a few factual errors, and so, while this book can be used for bed-time reading, I wouldn't count on it as a reference.

Before people pounce on me for mentioning 'factual errors' and not substantiating them, let me draw their attention to the description of calling conventions in this book. This book mentions that cdecl and stdcall pass arguments in different orders (i.e left to right for cdecl and right to left for stdcall). This is just plain wrong. I wonder how this important detail could not be caught during editing, and technical review.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit
ARRAY(0xa5f90018)

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?