Hacker Disassembling Uncovered, 2nd ed

Hacker Disassembling Uncovered, 2nd ed

PDF Hacker Disassembling Uncovered, 2nd ed Download

  • Author: Kris Kaspersky
  • Publisher: БХВ-Петербург
  • ISBN: 1931769648
  • Category : Computers
  • Languages : en
  • Pages : 550

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of how to go about disassembling a program with holes without its source code. Detailing hacking methods used to analyze programs using a debugger and disassembler such as virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators, this guide covers methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well, and a CD-ROM that contains illustrations and the source codes for the programs is also included.


Hacker Debugging Uncovered

Hacker Debugging Uncovered

PDF Hacker Debugging Uncovered Download

  • Author: Kris Kaspersky
  • Publisher: БХВ-Петербург
  • ISBN: 1931769400
  • Category : Computers
  • Languages : en
  • Pages : 500

Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in this debugger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstrated. Programmers will learn how to look at what is inside a computer system, how to reconstruct the operating algorithm of a program distributed without source code, how to modify the program, and how to debug drivers. The use of debugging applications and drivers in Windows and Unix operating systems on Intel Pentium/DEC Alpha-based processors is also detailed.


Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

PDF Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming Download

  • Author: Kris Kaspersky
  • Publisher: БХВ-Петербург
  • ISBN: 1931769222
  • Category : Computers
  • Languages : en
  • Pages : 600

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler. These methods include virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. Also covered are methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well.


Hacker Debugging Uncovered

Hacker Debugging Uncovered

PDF Hacker Debugging Uncovered Download

  • Author: Kris Kaspersky
  • Publisher:
  • ISBN: 9788183331005
  • Category : Computer software
  • Languages : en
  • Pages :


Hacker Disassembling Uncovered

Hacker Disassembling Uncovered

PDF Hacker Disassembling Uncovered Download

  • Author:
  • Publisher:
  • ISBN:
  • Category : Computer security
  • Languages : en
  • Pages : 584


Shellcoder's Programming Uncovered (Uncovered series)

Shellcoder's Programming Uncovered (Uncovered series)

PDF Shellcoder's Programming Uncovered (Uncovered series) Download

  • Author: Kris Kaspersky
  • Publisher: БХВ-Петербург
  • ISBN: 193176946X
  • Category : Computers
  • Languages : en
  • Pages : 500

How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are


Programming in C

Programming in C

PDF Programming in C Download

  • Author: Xingni Zhou
  • Publisher: Walter de Gruyter GmbH & Co KG
  • ISBN: 3110692325
  • Category : Computers
  • Languages : en
  • Pages : 371

This book covers C-Programming focussing on its practical side. Volume 1 deals mainly with basic data structures, algorithms and program statements. An extensive use of figures and examples help to give a clear description of concepts help the reader to gain a systematic understanding of the language.


Hacking- The art Of Exploitation

Hacking- The art Of Exploitation

PDF Hacking- The art Of Exploitation Download

  • Author: J. Erickson
  • Publisher: oshean collins
  • ISBN:
  • Category : Education
  • Languages : en
  • Pages : 214

This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.


Data Recovery Tips & Solutions: Windows, Linux, and BSD

Data Recovery Tips & Solutions: Windows, Linux, and BSD

PDF Data Recovery Tips & Solutions: Windows, Linux, and BSD Download

  • Author: Kris Kaspersky
  • Publisher: БХВ-Петербург
  • ISBN: 1931769567
  • Category : Computers
  • Languages : en
  • Pages : 370

This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating principles of the most popular file systems, automatic data recovery techniques, and manual recovery techniques used in cases of total data destruction. Data recovery from hard drives and optical storage in Windows, BSD, and Linux file systems is described, as are automatic recovery utilities, manual and automatic recovery of deleted files on ext2/ext3 partitions and NTFS partitions, formatted NTFS partitions and deleted UFS/FFS files, RAID data recovery, media restoration with physical damage, and data loss prevention.


Reversing

Reversing

PDF Reversing Download

  • Author: Eldad Eilam
  • Publisher: John Wiley & Sons
  • ISBN: 1118079760
  • Category : Computers
  • Languages : en
  • Pages : 630

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language