| 000 | 05590cam a2200565 i 4500 | ||
|---|---|---|---|
| 999 |
_c92754 _d92754 |
||
| 005 | 20250913090635.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 250913s2024 enkm o u001 0 eng d | ||
| 020 | _a9781394277131 | ||
| 020 |
_a9781394199907 _qelectronic book |
||
| 020 |
_a1394199902 _qelectronic book |
||
| 020 |
_a1394199899 _qelectronic book |
||
| 020 |
_a9781394199891 _qelectronic book |
||
| 020 |
_a9781394277131 _q(electronic bk.) |
||
| 020 |
_a139427713X _q(electronic bk.) |
||
| 020 |
_z9781394199884 _qpaperback |
||
| 024 | 7 |
_a10.1002/9781394277131 _2doi |
|
| 035 |
_a(OCoLC)1420171149 _z(OCoLC)1420174456 |
||
| 037 |
_a9781394199884 _bO'Reilly Media |
||
| 037 |
_aFCB51403-4CB8-4C79-985C-F5C1A78260E8 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 037 |
_a10649669 _bIEEE |
||
| 040 |
_aUKAHL _beng _erda _cUKAHL _dN$T _dOCLCO _dYDX _dOCLCO _dORMDA _dTEFOD _dIEEEE _dDG1 |
||
| 041 | _aeng | ||
| 050 | 4 |
_aQA76.9.A25 _bD66 2024 |
|
| 082 | 0 | 4 |
_a005.8 _223/eng/20240209 |
| 100 | 1 |
_aDomas, Stephanie, _0https://id.loc.gov/authorities/names/no2024029252 _eauthor. |
|
| 245 | 1 | 0 |
_ax86 software reverse-engineering, cracking, and counter-measures / _cStephanie Domas, Christopher Domas. |
| 264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, Inc. _c[2024] |
|
| 300 |
_a1 online resource : _billustrations (some color) |
||
| 336 |
_atext _btxt _2rdacontent. |
||
| 337 |
_acomputer _bc _2rdamedia. |
||
| 338 |
_aonline resource _bcr _2rdacarrier. |
||
| 340 |
_2rdacc _0http://rdaregistry.info/termList/RDAColourContent/1003. |
||
| 490 | 1 | _aTech today. | |
| 504 | _aIncludes index. | ||
| 505 | 0 | _aIntroduction xxiii -- Chapter 1 Decompilation and Architecture 1 -- Chapter 2 x86 Assembly: Data, Modes, Registers, and Memory Access 13 -- Chapter 3 x86 Assembly: Instructions 31 -- Chapter 4 Building and Running Assembly Programs 43 -- Chapter 5 Understanding Condition Codes 57 -- Chapter 6 Analyzing and Debugging Assembly Code 65 -- Chapter 7 Functions and Control Flow 77 -- Chapter 8 Compilers and Optimizers 127 -- Chapter 9 Reverse Engineering: Tools and Strategies 137 -- Chapter 10 Cracking: Tools and Strategies 147 -- Chapter 11 Patching and Advanced Tooling 179 -- Chapter 12 Defense 203 -- Chapter 13 Advanced Defensive Techniques 217 -- Chapter 14 Detection and Prevention 229 -- Chapter 15 Legal 239 -- Chapter 16 Advanced Techniques 245 -- Chapter 17 Bonus Topics 251 -- Conclusion 271 -- Index 273. | |
| 520 |
_a"A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications." -- _cProvided by publisher. |
||
| 545 | 0 | _aAbout the Author STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast. CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor. | |
| 650 | 0 |
_aComputer security. _0https://id.loc.gov/authorities/subjects/sh90001862. |
|
| 650 | 0 |
_aX86 assembly language (Computer program language) _0https://id.loc.gov/authorities/subjects/sh2012003657. |
|
| 650 | 0 |
_aReverse engineering. _0https://id.loc.gov/authorities/subjects/sh93004214. |
|
| 650 | 0 |
_aHacking. _0https://id.loc.gov/authorities/subjects/sh2013002597. |
|
| 650 | 0 |
_aSoftware architecture. _0https://id.loc.gov/authorities/subjects/sh2004001071. |
|
| 655 | 4 | _aElectronic books. | |
| 700 | 1 |
_aDomas, Christopher, _0https://id.loc.gov/authorities/names/no2024029250 _eauthor. |
|
| 830 | 0 | _aTech today. | |
| 856 |
_uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781394277131#aboutBook-pane _yFull text is available at Wiley Online Library Click here to view |
||
| 942 |
_2ddc _cER |
||