x86 software reverse-engineering, cracking, and counter-measures (Record no. 1839)

MARC details
000 -LEADER
fixed length control field 02709nam a2200229 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250811144553.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250806b2024|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394199907
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.26
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Domas, Stephanie
Relator term Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Domas, Christopher
Relator term Co-Author
245 ## - TITLE STATEMENT
Title x86 software reverse-engineering, cracking, and counter-measures
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley and Data Cybersecurity,
Year of publication 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxix, 284p.
500 ## - GENERAL NOTE
General note A crystal-clear and practical blueprint to software disassembly<br/><br/>x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required.<br/><br/>The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world’s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we’ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively.<br/><br/>Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions<br/>Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools<br/>Cracking: patching, key checkers, key generators, resource hacking, dependency walking<br/>Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation<br/>A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data, Modes, Registers, and Memory Access
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Building and Running Assembly Programs
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Analyzing and Debugging Assembly Code
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10649669
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.26 EB0263 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha