logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Mastering Reverse Engineering Reengineer Your Ethical Hacking Skills Reginald Wong

  • SKU: BELL-7350338
Mastering Reverse Engineering Reengineer Your Ethical Hacking Skills Reginald Wong
$ 31.00 $ 45.00 (-31%)

5.0

80 reviews

Mastering Reverse Engineering Reengineer Your Ethical Hacking Skills Reginald Wong instant download after payment.

Publisher: Packt Publishing
File Extension: PDF
File size: 14.24 MB
Pages: 423
Author: Reginald Wong
ISBN: 9781788838849, 178883884X
Language: English
Year: 2018

Product desciption

Mastering Reverse Engineering Reengineer Your Ethical Hacking Skills Reginald Wong by Reginald Wong 9781788838849, 178883884X instant download after payment.

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.

Related Products