LEADER 00000cam a2200901Ia 4500 001 80242141 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cn||||||||| 008 050201s2005 inua fo 001 0 eng d 010 2005921595 019 63788750|a123159596|a181842018|a473078766|a560025747 |a635506374|a647471971|a669756548|a722436706|a728034693 |a806202462|a814300820|a888567421|a961541224|a962672076 |a966144798|a988523411|a991965618|a1037469499|a1037708982 |a1038624528|a1045580862|a1055397171|a1063812352 |a1103262571|a1116791713|a1129377724|a1153019950 |a1162216932|a1192340134|a1228527874|a1240510476 020 076459768X|q(electronic bk.) 020 9780764597688|q(electronic bk.) 020 |q(pbk.) 020 |q(pbk.) 020 1280255811|q(ebk.) 020 9781280255816|q(ebk.) 020 1118079760 020 9781118079768 020 9786610255818 020 6610255814 029 1 AU@|b000048762110 029 1 AU@|b000051408691 029 1 AU@|b000053234862 029 1 DEBBG|bBV044080251 029 1 DEBSZ|b355428652 029 1 DEBSZ|b396063705 029 1 HEBIS|b291499872 029 1 NZ1|b12037070 035 (OCoLC)80242141|z(OCoLC)63788750|z(OCoLC)123159596 |z(OCoLC)181842018|z(OCoLC)473078766|z(OCoLC)560025747 |z(OCoLC)635506374|z(OCoLC)647471971|z(OCoLC)669756548 |z(OCoLC)722436706|z(OCoLC)728034693|z(OCoLC)806202462 |z(OCoLC)814300820|z(OCoLC)888567421|z(OCoLC)961541224 |z(OCoLC)962672076|z(OCoLC)966144798|z(OCoLC)988523411 |z(OCoLC)991965618|z(OCoLC)1037469499|z(OCoLC)1037708982 |z(OCoLC)1038624528|z(OCoLC)1045580862|z(OCoLC)1055397171 |z(OCoLC)1063812352|z(OCoLC)1103262571|z(OCoLC)1116791713 |z(OCoLC)1129377724|z(OCoLC)1153019950|z(OCoLC)1162216932 |z(OCoLC)1192340134|z(OCoLC)1228527874|z(OCoLC)1240510476 037 25581|bMIL 040 REDDC|beng|epn|cREDDC|dHVC|dOCLCQ|dTEFOD|dEBLCP|dUMI |dIDEBK|dCEF|dMNU|dHNK|dOCLCQ|dDKDLA|dMERUC|dCCO|dE7B|dFVL |dB24X7|dOCLCQ|dDEBSZ|dOCLCQ|dOCLCF|dOCLCQ|dXFF|dOCLCQ |dTEFOD|dN$T|dMUX|dMHW|dOCLCQ|dOCLCO|dOCLCQ|dD6H|dAZK|dLOA |dAGLDB|dMOR|dPIFBR|dZCU|dLIV|dOCLCQ|dU3W|dOCLCA|dBRL|dSTF |dWRM|dOCLCQ|dVTS|dNRAMU|dICG|dINT|dVT2|dOCLCQ|dCOO|dCNNOR |dOCLCQ|dUAB|dWYU|dG3B|dTKN|dDKC|dOCLCQ|dS2H|dVLY|dUKCRE |dOCLCO|dUKAHL|dOCLCO|dOCLCQ|dVI#|dOCLCO|dOCLCL 049 INap 082 04 005.1 082 04 005.1|222 099 eBook O’Reilly for Public Libraries 100 1 Eilam, Eldad. 245 10 Reversing :|bsecrets of reverse engineering /|cEldad Eilam ; [foreword by Elliot Chikofsky].|h[O'Reilly electronic resource] 260 Indianapolis, IN :|bWiley,|c©2005. 300 1 online resource (xxviii, 589 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 340 |pillustration|2rdaill 347 text file|2rdaft 505 0 Part I: Reversing 101. Chapter 1: Foundations -- Chapter 2 : Low-Level Software -- Chapter 3: Windows Fundamentals -- Chapter 4: Reversing Tools -- Part II: Applied Reversing. Chapter 5: Beyond the Documentation -- Chapter 6: Deciphering File Formats -- Chapter 7: Auditing Program Binaries -- Chapter 8: Reversing Malware -- Part III: Cracking. Chapter 9: Piracy and Copy Protection -- Chapter 10: Antireversing Techniques -- Chapter 11: Breaking Protections -- Part IV: Beyond Disassembly. Chapter 12: Reversing .NET -- Chapter 13: Decompilation -- Appendix A: Deciphering Code Structures -- Appendix B: Understanding Compiled Arithmetic -- Appendix C: Deciphering Program Data. 520 Beginning with a basic primer on reverse engineering- including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. This is the first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products. It helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware. The book offers a primer on advanced reverse- engineering, delving into "disassembly," code-level reverse engineering, and explains how to decipher assembly language. 546 English. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Software engineering. 650 0 Reverse engineering. 650 0 Computer security. 650 2 Computer Security 650 6 Génie logiciel. 650 6 Rétro-ingénierie. 650 6 Sécurité informatique. 650 7 Software engineering.|2blmlsh 650 7 Reverse engineering.|2blmlsh 650 7 Computer security.|2blmlsh 650 7 Computer security|2fast 650 7 Reverse engineering|2fast 650 7 Software engineering|2fast 700 1 Chikofsky, Elliot J. 776 08 |iPrint version:|aEilam, Eldad.|tReversing.|dIndianapolis, IN : Wiley, ©2005|z9780764574818|w(DLC) 2005921595 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780764574818/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH21623013 938 Books 24x7|bB247|nbks00036457 938 EBL - Ebook Library|bEBLB|nEBL227440 938 ebrary|bEBRY|nebr10113939 938 EBSCOhost|bEBSC|n130978 938 ProQuest MyiLibrary Digital eBook Collection|bIDEB|n25581 994 92|bJFN