Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
A Hackers, Computers, Science book. Do not be fooled by the name of the book or even the reviews you read, this...
This book provides a systematic approach to reverse engineering. Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices;...
Download or read Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation in PDF formats. You may also find other subjects related with Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation.
- Filetype: PDF
- Pages: 355 pages
- ISBN: 9781118787311 / 0
SymWiUSuh8Z.pdf
More About Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
it's a really interesting book. I'd love its obfuscation chapter, it summarized all obfuscation techniques with the familiar words so it's good for all new reverser like me! Pretty horrible. I was really looking forward to this book, and I bought it as soon as it was released. Unfortunately I was very disappointed. There's a trend in tech books to put 'the art of...' or 'practical...' in the title, but never have I seen the word 'practical' used so inappropriately. This book has a lot of information in... Do not be fooled by the name of the book or even the reviews you read, this book is entirely for people who are semi-experienced in Reverse-Engineering, if you are a novice trying to learn about Reverse-Engineering this is not the book for you.