You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkit...
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Following the successful repackaging of Bruce Coville’s My Teacher Is an Alien series, great new covers for another popular backlist series from the bestselling author. IT’S THE WEIRDEST ALIEN INVASION EVER! “I cannot tell a lie,” says Rod Allbright. And it’s the truth. Ask him a question and he’s bound to give you an honest answer. Which is why, when his teacher asks what happened to last night’s math assignment, Rod has to give the only answer he can: “Aliens ate my homework, Miss Maloney!” Of course, no one believes Rod this time, so they don’t bother to ask him why the aliens are here. It’s just as well, since he is sworn to silence about their secret mission and the fact that he has been drafted to help them!
KIDNAPPED TO DIMENSION X! When Rod Allbright's cousin Elspeth arrived for a visit the day after school let out for the summer, Rod thought his vacation was ruined. But after they are kidnapped to Dimension X by a monster named Smorkus Flinders, Rod realizes that Elspeth is the least of his problems. After all, what's a bratty cousin compared to cranky monsters, furious aliens, and the discovery that you are stuck in the middle of an interstellar power play? And that doesn't begin to take into account the horrifying personal decision that Rod will be forced to make before his adventures are over.
A New York Times bestseller—over one million copies sold! A National Book Award winner A Boston Globe-Horn Book Award winner Bestselling author Sherman Alexie tells the story of Junior, a budding cartoonist growing up on the Spokane Indian Reservation. Determined to take his future into his own hands, Junior leaves his troubled school on the rez to attend an all-white farm town high school where the only other Indian is the school mascot. Heartbreaking, funny, and beautifully written, The Absolutely True Diary of a Part-Time Indian, which is based on the author's own experiences, coupled with poignant drawings by Ellen Forney that reflect the character's art, chronicles the contemporary adolescence of one Native American boy as he attempts to break away from the life he was destined to live. With a forward by Markus Zusak, interviews with Sherman Alexie and Ellen Forney, and black-and-white interior art throughout, this edition is perfect for fans and collectors alike.
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you’ll learn: • How Windows boots—including 32-bit, 64-bit, and UEFI mode—and where to find vulnerabilities • The details of boot process security mechanisms like Secure Boot, includi...
The Cool Side of My Pillow is a collection of essays by actor, cult icon and New York Times bestselling author Bruce Campbell, sharing some of his experiences and observations outside of the entertainment industry.In Campbell's own words, "What's it about? Mostly, things that matter to me, like putting in the effort, being honest and not treating the environment like it's the enemy. Is it self-help? I hope not, but you will find musings about fame, mysterious carvings, UFOs and my general disdain of loud noises. Is it political? If it is, I'll refund your money. There are no conspiracy theories in The Cool Side of my Pillow, just snarky humor and a sincere desire for us all to find peace on earth."
As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on number theory, explores block ciphers, and teaches the basis of all modern cryptanalysis: linear and differential cryptanalysis. This time-honored weapon of warfare has become a key piece of artillery in the battle for information security.
A guide to using the Ghidra software reverse engineering tool suite. The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency's most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world's most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere -- and The Ghidra Book is the one and only guide you need to master it. In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra's components, features, and unique ca...
From the subversive to the antic, the uproarious to the disturbing, the stories of Bruce Sterling are restless, energy-filled journeys through a world running on empty--the visionary work of one of our most imaginative and insightful modern writers. They live as strangers in strange lands. In worlds that have fallen--or should have. They wage battles in wars already lost and become heroes--and sometimes martyrs--in their last-ditch efforts to preserve the dignity and individuality of humanity. A hack Indian filmmaker takes the pulse of a wounded and declining civilization--21st-century Britain. A pair of swashbuckling Silicon Valley entrepreneurs join forces to make a commercial killing--in ...