Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 34,84

Économisez
EUR 12,66 (27%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation par [Dang, Bruce, Gazet, Alexandre, Bachaalany, Elias]
Publicité sur l'appli Kindle

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Format Kindle

4.3 étoiles sur 5 3 commentaires client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 34,84

Polars Polars


Descriptions du produit

Présentation de l'éditeur

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.

The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.

  • Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
  • Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
  • Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
  • Demystifies topics that have a steep learning curve
  • Includes a bonus chapter on reverse engineering tools

Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.

Quatrième de couverture

LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial–of–service, intrusions, and espionage operations. Reverse engineering is the only method to thoroughly dissect and understand such software. So it is no surprise that reverse engineering is one of the most important subjects in information security. Unfortunately, it is often perceived as a mysterious and complex black art. Although reverse engineering is a difficult subject, the authors believe there is a scientific approach to it. Practical Reverse Engineering aims to demystify the art and systematize the reverse–engineering process for students and professionals. Discover a unique, systematic approach to reverse engineering that incorporates hands–on analysis with real–world malware Find detailed coverage of the three most popular processor architectures: x86, x64, and ARM Use this concise, structured treatment of the Windows kernel and kernel–mode drivers, featuring walk–throughs and exercises with real–world rootkits Learn sophisticated code–obfuscation techniques, such as those used in virtual machine protections, and how to deobfuscate them using program–analysis techniques Discover advanced debugging techniques to automate and streamline the reverse–engineering process Apply newly learned concepts with complete walk–throughs and exercises using real–world malware

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4932 KB
  • Nombre de pages de l'édition imprimée : 384 pages
  • Editeur : Wiley; Édition : 1 (3 février 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00IA22R2Y
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : 4.3 étoiles sur 5 3 commentaires client
  • Classement des meilleures ventes d'Amazon: n°77.286 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?


click to open popover

Commentaires en ligne

4.3 étoiles sur 5
5 étoiles
1
4 étoiles
2
3 étoiles
0
2 étoiles
0
1 étoile
0
Voir les 3 commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché Achat vérifié
Un très bon livre, que je recommande aux personnes souhaitant débuter ou compléter leurs connaissances en reverse engineering.

Les chapitres se suivent dans le bon ordre, les exemples sont bien choisis et les exercices complètent le tout.
Il manque une petite étoile car pour le moment les corrigés ne sont pas (tous) disponibles, même s'ils arrivent progressivement sur la Toile.

Un must-have !
Remarque sur ce commentaire Une personne a trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché Achat vérifié
Très bonne littérature sur le sujet, avec une excellente partie sur le Kernel Windows.
Attention, c'est un livre très spécialisé, pas vraiment pour l'initiation, même pour un habitué, c'est assez dense.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché Achat vérifié
Ce livre ne vise pas à former des hackers: il vous permet de mettre le pied à l'étrier et d'appréhender différemment la programmation en assembleur, mais pas seulement... à lire ET à relire!!
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.7 étoiles sur 5 24 commentaires
38 internautes sur 39 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Very good. Dense, but readadable. 24 février 2014
Par Scott Piper - Publié sur Amazon.com
Format: Broché Achat vérifié
This book does a good job of teaching. It's not just another reference book. A lot of technical books just blast facts at you, and sure you might learn a lot but you don't know how the author learned those things himself. This book takes more of a teaching approach: You learn how the authors learned things.

This book is fairly small for a technical book at only 340 pages, but it is very dense. Every sentence is important.

You need to have used IDA and windbg before you start reading this book.

Very helpful to translate your knowledge from x86 to ARM and explaining how Windows kernel code works. I really like it's line "If the process of reverse engineering Windows drivers could be modeled as a discrete task, 90% would be understanding how Windows works and 10% would be understanding assembly code."
15 internautes sur 16 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The part on VM RE is the most useful 19 mai 2014
Par Maxzis - Publié sur Amazon.com
Format: Broché
Probably the best book on the subject next to The IDA Pro Book 2nd Edition and The ShellCoders Handbook. Most of the stuff is easy to learn, but when you get around to obfuscation, especially byte code VMs, and drivers, it gets complex. Also identifying encryption and compression used. There is also deep complexity around dealing with large data structures. None of this complexity goes away either as you gain experience, it just sometimes goes by faster..

When you're dealing with embedded devices most of the battle is with embedded encryption interfaces and dumping..

My final thoughts: This just gets you started in RE. I really wish there was an exploit development book written like this..
12 internautes sur 14 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent book for those who want to upgrade their skills in reverse engineering. 15 avril 2014
Par Mark Lim - Publié sur Amazon.com
Format: Format Kindle
Though I have been doing reverse engineering for a while, I did learn quite a few things from the book. This book is great for those who hope to have a deeper knowledge of Windows Kernel structures. I have been uploading my answers to the exercises in the book to this blog http://findingvulns.blogspot.sg/ I welcome comments.
8 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Invaluable 14 avril 2014
Par Prime - Publié sur Amazon.com
Format: Broché Achat vérifié
Well written, concise explanations and examples. After just the first few pages, this instantly became one of my favorite books to read for both knowledge and leisure. If you're in the office with resources to try the examples and homework, or if you're on the plane jotting down notes, Practical Reverse Engineering is appropriate for just about any setting.

Chapter 3: The Windows Kernel is my favorite chapter so far. If you're trying to learn more about the kernel from a security prospective, this is what you must read. I wasn't looking for a reverse engineering guide on it, instead fundamentals and concepts with a security perspective, but instead I got both. There's nothing else out there like this book.

Highly Recommended!
5 internautes sur 5 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Like its title 8 juillet 2014
Par Fricsay, Lin - Publié sur Amazon.com
Format: Broché Achat vérifié
Like its title, this book is very 'pratical'.

I do kernel and windbg very often (my daily work) so I started from these two chapters. It's very interesting to understand the kernel and windbg through this way. If you're not familiar with kernel and windbg, I suggest you read Windows Internals along with this book. Windows Internals tell you how the kernel works but without showing the code. With this book, you can actually use windbg to know how it works (dump or live debugging). This is very important for engineers because we need something to play with.

There are a lot of exercises in this book. I suggest the readers should do the exercises. The authors are very responsive and we can also find the answers/discussion on the internet. The authors also answer the questions on reddit. If you have hard time working on the exercises you can always send the mail to the authors.
Ces commentaires ont-ils été utiles ? Dites-le-nous