Image from Google Jackets

Implementing reverse engineering Jitendra Narula the real practice of x86 internals, code calling conventions, ransomware decryption, application cracking, assembly language, and proven cybersecurity open source tools

By: Language: English Publication details: Bpb Publications 2022 New DelhiEdition: 1st edDescription: xxi, 471 p. ill. 24 cmISBN:
  • 9789391030377
Subject(s): DDC classification:
  • 005.8 NAR
Summary: The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practical on various applications to give users hands-on experience.
Item type: English Books
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Current library Call number Status Date due Barcode
Anna Centenary Library 5.8 NAR (Browse shelf(Opens below)) Available 675183
Anna Centenary Library 3RD FLOOR, A WING 005.8 NAR (Browse shelf(Opens below)) Available 675182

Reprint, 2023

Includes index

The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practical on various applications to give users hands-on experience.

There are no comments on this title.

to post a comment.

Find us on the map

Powered by Koha