Reversing: Secrets of Reverse Engineering and over one million other books are available for Amazon Kindle. Learn more
CDN$ 30.09
  • List Price: CDN$ 47.99
  • You Save: CDN$ 17.90 (37%)
Only 3 left in stock (more on the way).
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Reversing: Secrets of Reverse Engineering Paperback – Apr 15 2005


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 30.09
CDN$ 25.24 CDN$ 36.22

2014 Books Gift Guide
Thug Kitchen, adapted from the wildly popular web site beloved by Gwyneth Paltrow ("This might be my favorite thing ever"), is featured in our 2014 Books Gift Guide. More gift ideas

Special Offers and Product Promotions

  • Join Amazon Student in Canada


Frequently Bought Together

Reversing: Secrets of Reverse Engineering + Hacking : The Art of Exploitation, 2nd Edition
Price For Both: CDN$ 63.01


Customers Who Bought This Item Also Bought



Product Details

  • Paperback: 624 pages
  • Publisher: Wiley; 1 edition (April 15 2005)
  • Language: English
  • ISBN-10: 0764574817
  • ISBN-13: 978-0764574818
  • Product Dimensions: 18.8 x 3.4 x 23.4 cm
  • Shipping Weight: 880 g
  • Average Customer Review: 4.9 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Bestsellers Rank: #126,521 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse-engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.

  • Learn to read compiler-generated assembly language code for IA-32 compatible processors
  • Decipher an undocumented file format or network protocol
  • Understand when reverse engineering is legal, and when—and why—it may not be
  • See how hackers use reversing to defeat copy protection technology
  • Find out how to pull the plug on malicious code
  • Determine how to prevent others from reversing your code, and find out how effective such steps can be
  • Explore reverse engineering on the .NET platform and its assembly language, MSIL
  • Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems

About the Author

Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.

Inside This Book (Learn More)
First Sentence
Reverse engineering is the process of extracting the knowledge or design blueprints from anything man-made. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.9 out of 5 stars
5 star
6
4 star
1
3 star
0
2 star
0
1 star
0
See all 7 customer reviews
Share your thoughts with other customers

Most helpful customer reviews

2 of 2 people found the following review helpful By Mark Burrell on April 19 2008
Format: Paperback
This book includes a great deal of effective and practical techniques related to the subject. While reading this book it soon becomes very clear that the author is a highly experienced professional in the field. He does a wonderful job presenting the many relevant topics presented in the book. If developers want to discover vulnerabilities in their own applications, this book will give some excellent pointers. Security professionals will very likely draw some great benefits from it as well. This book is loaded with information which is generally easy to read, (more so if you are familiar with some high and low level programming languages), and remains right on topic. This book is definitely a "must read!"
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
3 of 3 people found the following review helpful By Mike Bluett on Nov. 16 2006
Format: Paperback
This book is very well written. It deals with a fairly complex subject and still manages to keep the reader on track.

Very good for beginners and others.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
3 of 3 people found the following review helpful By Martin Bishop on July 19 2006
Format: Paperback
A very solid, professional publication. The appendices are invaluable.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback Verified Purchase
A very well written book, that offer's enough insight to get you going in the field of RE.

- John
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.


Feedback