000 01127nam a2200205Ia 4500
008 240822s9999 xx 000 0 und d
020 _a9789391030377
_qpbk
041 _aeng
082 _a005.8
_bNAR
100 _aNarula, Jitendra
245 0 _aImplementing reverse engineering
_cJitendra Narula
_bthe real practice of x86 internals, code calling conventions, ransomware decryption, application cracking, assembly language, and proven cybersecurity open source tools
250 _a1st ed.
260 _bBpb Publications
_c2022
_aNew Delhi
300 _axxi, 471 p.
_bill.
_c24 cm.
500 _aReprint, 2023
504 _aindex
520 _aThe first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practical on various applications to give users hands-on experience.
650 _aGender Code calling conventions, Ransomeware decryption, Application cracking, Assembly language
942 _cENGLISH
999 _c526029
_d526029