Goodreads helps you keep track of books you want to read.
Start by marking “Reversing: Secrets of Reverse Engineering” as Want to Read:
Reversing: Secrets of Reverse Engineering
Enlarge cover
Rate this book
Clear rating
Open Preview

Reversing: Secrets of Reverse Engineering

3.99  ·  Rating Details  ·  310 Ratings  ·  10 Reviews
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engi ...more
Paperback, 624 pages
Published April 15th 2005 by Wiley
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Reversing, please sign up.

Be the first to ask a question about Reversing

Security Engineering by Ross J. AndersonSecrets and Lies by Bruce SchneierThe Tangled Web by Michal ZalewskiIntroduction to Security and Applied Cryptography by Bruce SchneierThe Practice of Network Security Monitoring by Richard Bejtlich
Information Security
19th out of 70 books — 20 voters
Lock Pick 2 by AnonymousLock Pick 64/128 by AnonymousC-64 Software Protection Revealed by Dell M. TaylorThe Software Pirate's Handbook by David  ThomCSM Newsletter by T. N. Simstad
Software Cracking
11th out of 24 books — 1 voter


More lists with this book...

Community Reviews

(showing 1-30 of 1,144)
filter  |  sort: default (?)  |  Rating Details
Andre
May 02, 2012 Andre rated it liked it
One thing that drives me nuts is when an author treats its readers like novices, then doesn't explain more difficult portions of the material.

... reading a book is an exercise in self-reflection. I read this book cover to cover. The author isn't showing you how to play patty cake. The author takes more of an academic approach and expects that you (the reader) will dig into the material more on your own. His job is more like a lecturer. Your job is to put in the work to understand what's going on
...more
Gurudatha Pai
Jun 15, 2014 Gurudatha Pai rated it really liked it
The things I learned from MOSFET to digital circuits to microchips to microprocessors to assembly languages to high level languages all made much more sense after reading it.
I did not however learn to reverse engineer software but that is besides the point. The book is dense, it requires the reader to be familiar with many aspects of digital electronics and computer science.
Moshe Zioni
I enjoyed reading Reversing, it was fun and educational.

Problem with this book is that it didn't meat my expectations. It covers a lot of information but it is hard to be as a reference for future reversing (which I hoped to get from ~800 pages). I hoped to get more information related to security, copy-protections and how to break them (knowing is the path to fixing...).

That said, Mr. Eilam put a lot of effort and knowledge into one archive that no one else could have compiled before, and truly
...more
Empire539
Aug 27, 2012 Empire539 rated it it was amazing
Shelves: on-hold, technical
Great for the technically-minded reader, but can go a bit over the head for those inexperienced with low-level hardware. A light background in computer engineering and/or hardware is suggested before reading, but not completely necessary. The text doesn't go into excruciating detail, but gives you enough information to find your way around. Highly informative for a comp. eng. major like me!
Michael Venzke
Jul 30, 2007 Michael Venzke rated it liked it
Shelves: technical
worth reading for hardcore programmers, esp people who release software, even if you're not interested in reverse engineering anything.

also good if you're stuck with an undocumented API, or if you're interested in shareware/anti-piracy/security techniques.
Masa
Oct 11, 2015 Masa rated it really liked it
Shelves: half-read, science
Though it was slightly out of my use case, I definitely saw the value in that specific domain. He walks you through of how part in a concise manner.
Daniel
Mar 14, 2015 Daniel rated it liked it
Shelves: professional
I found this book interesting, quite bulky though and the style in which it is written does not make it an easy read.
dersteppenwolf
Mar 03, 2012 dersteppenwolf rated it really liked it
Libro único en su tema.muy útil para los interesados en seguridad informática
João Júnior
May 17, 2013 João Júnior rated it really liked it
Excellent book for beginners on the subject.
Dumah
Aug 04, 2012 Dumah added it
excellent
Baibhav
Baibhav marked it as to-read
Jul 22, 2016
Rizwan
Rizwan rated it really liked it
Jul 20, 2016
Solo
Solo added it
Jul 18, 2016
Abuzar
Abuzar marked it as to-read
Jul 16, 2016
Ron
Ron added it
Jul 15, 2016
Viktor Slavchev
Viktor Slavchev marked it as to-read
Jul 13, 2016
ehovind
ehovind marked it as to-read
Jul 12, 2016
Ross
Ross marked it as to-read
Jul 10, 2016
Samed
Samed marked it as to-read
Jul 07, 2016
JR
JR marked it as to-read
Jul 07, 2016
Phil
Phil rated it it was amazing
Jul 06, 2016
Darkchan
Darkchan marked it as to-read
Jul 05, 2016
Diego Da Silva
Diego Da Silva rated it liked it
Jul 05, 2016
Omesh
Omesh marked it as to-read
Jul 04, 2016
Alessandro Molari
Alessandro Molari marked it as to-read
Jul 03, 2016
Stephin Philip
Stephin Philip marked it as to-read
Jun 29, 2016
Jeremy Main
Jeremy Main marked it as to-read
Jun 28, 2016
Adam Ryder
Adam Ryder marked it as to-read
Jun 27, 2016
Ishwor Gurung
Ishwor Gurung is currently reading it
Jun 27, 2016
« previous 1 3 4 5 6 7 8 9 38 39 next »
There are no discussion topics on this book yet. Be the first to start one »
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
  • Writing Secure Code
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Rootkits: Subverting the Windows Kernel
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Metasploit: The Penetration Tester's Guide
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Hacking: The Art of Exploitation
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book