x86 software reverse-engineering, cracking, and counter-measures / (Record no. 92754)

000 -LEADER
fixed length control field 05590cam a2200565 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250913090635.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250913s2024 enkm o u001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394277131
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394199907
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1394199902
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1394199899
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394199891
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394277131
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 139427713X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781394199884
Qualifying information paperback
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781394277131
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1420171149
Canceled/invalid control number (OCoLC)1420174456
037 ## - SOURCE OF ACQUISITION
Stock number 9781394199884
Source of stock number/acquisition O'Reilly Media
037 ## - SOURCE OF ACQUISITION
Stock number FCB51403-4CB8-4C79-985C-F5C1A78260E8
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
037 ## - SOURCE OF ACQUISITION
Stock number 10649669
Source of stock number/acquisition IEEE
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number D66 2024
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23/eng/20240209
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Domas, Stephanie,
Authority record control number https://id.loc.gov/authorities/names/no2024029252
Relator term author.
245 10 - TITLE STATEMENT
Title x86 software reverse-engineering, cracking, and counter-measures /
Statement of responsibility, etc Stephanie Domas, Christopher Domas.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey :
Name of publisher, distributor, etc John Wiley & Sons, Inc.
Date of publication, distribution, etc [2024]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details illustrations (some color)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier.
340 ## - PHYSICAL MEDIUM
Source rdacc
Authority record control number or standard number http://rdaregistry.info/termList/RDAColourContent/1003.
490 1# - SERIES STATEMENT
Series statement Tech today.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index.
520 ## - SUMMARY, ETC.
Summary, etc "A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications." --
Assigning source Provided by publisher.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.<br/><br/>CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Authority record control number https://id.loc.gov/authorities/subjects/sh90001862.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element X86 assembly language (Computer program language)
Authority record control number https://id.loc.gov/authorities/subjects/sh2012003657.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Reverse engineering.
Authority record control number https://id.loc.gov/authorities/subjects/sh93004214.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking.
Authority record control number https://id.loc.gov/authorities/subjects/sh2013002597.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Software architecture.
Authority record control number https://id.loc.gov/authorities/subjects/sh2004001071.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Domas, Christopher,
Authority record control number https://id.loc.gov/authorities/names/no2024029250
Relator term author.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Tech today.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131#aboutBook-pane
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-09-13 ALBASA Consortium 005.8 D71 2024 2025-09-13 2025-09-13 EBOOK