Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Reading how hacks are accomplished, for you to forestall them inside the destiny
opposite engineering is the system of studying hardware or software and know-how it, without gaining access to the source code or layout documents. Hackers are capable of opposing engineering systems and exploiting what they locate with scary outcomes. Now the best guys can use the same tools to thwart those threats. Practical opposite engineering is going beneath the hood of opposite engineering for security analysts, safety engineers, and machine programmers so that they will discover ways to use these identical approaches to stop hackers in their tracks. The e-book covers x86, x64, and arm (the first e-book to cowl all three); Windows kernel-mode code rootkits and drivers; digital machine safety techniques; and lots more. Satisfactory of all, it gives a systematic technique to the fabric, with lots of arms-on physical games and actual-international examples.
Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
ABOUT THE AUTHOR (Credit to Author)
Alexandre Gazet is a senior security researcher at QuarksLab focusing on reverse engineering and software protection.
Elias Bachaalany is a software security engineer at Microsoft.
Download Link:- NULL
0 تعليقات
Do Not Send SPAM Link !!!!