Librería: HPB-Red, Dallas, TX, Estados Unidos de America
EUR 8,83
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Librería: BooksRun, Philadelphia, PA, Estados Unidos de America
EUR 14,64
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Good. 1. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Librería: World of Books (was SecondSale), Montgomery, IL, Estados Unidos de America
EUR 16,97
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 22,74
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 42,06
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por John Wiley & Sons Inc, New York, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
Original o primera edición
EUR 44,40
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: INDOO, Avenel, NJ, Estados Unidos de America
EUR 44,95
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Brand New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 47,01
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: medimops, Berlin, Alemania
EUR 33,72
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Idioma: Inglés
Publicado por John Wiley & Sons 2/17/2014, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
EUR 50,36
Cantidad disponible: 5 disponibles
Añadir al carritoPaperback or Softback. Condición: New. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. Book.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 47,37
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 53,82
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GoldBooks, Denver, CO, Estados Unidos de America
EUR 61,00
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: new.
EUR 58,04
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. pp. 384.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 47,92
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 51,73
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. In.
Librería: Chiron Media, Wallingford, Reino Unido
EUR 48,25
Cantidad disponible: 3 disponibles
Añadir al carritoPaperback. Condición: New.
Idioma: Inglés
Publicado por John Wiley and Sons Inc, US, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
EUR 67,52
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
Idioma: Inglés
Publicado por John Wiley and Sons Inc, US, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 67,73
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: New. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
Librería: Ubiquity Trade, Miami, FL, Estados Unidos de America
EUR 67,69
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Brand new! Please provide a physical shipping address.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 54,51
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 70,70
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. pp. 384.
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Original o primera edición
EUR 61,61
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Num Pages: 384 pages, figures. BIC Classification: TBC; UYF. Category: (P) Professional & Vocational. Dimension: 191 x 235 x 21. Weight in Grams: 650. . 2014. 1st Edition. Paperback. . . . .
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 55,51
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback / softback. Condición: New. New copy - Usually dispatched within 4 working days.
EUR 66,89
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. pp. 384.
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
EUR 76,09
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Num Pages: 384 pages, figures. BIC Classification: TBC; UYF. Category: (P) Professional & Vocational. Dimension: 191 x 235 x 21. Weight in Grams: 650. . 2014. 1st Edition. Paperback. . . . . Books ship from the US and Ireland.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 72,48
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 336 pages. 9.50x7.50x0.75 inches. In Stock.
Idioma: Inglés
Publicado por John Wiley & Sons Inc, New York, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Librería: AussieBookSeller, Truganina, VIC, Australia
Original o primera edición
EUR 57,57
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Idioma: Inglés
Publicado por John Wiley & Sons Inc, New York, 2014
ISBN 10: 1118787315 ISBN 13: 9781118787311
Librería: CitiRetail, Stevenage, Reino Unido
Original o primera edición
EUR 47,94
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
EUR 45,41
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: NEW.