Reversing: Secrets of Reverse Engineering
Enlarge cover
Rate this book
Clear rating

Reversing: Secrets of Reverse Engineering

4.06 of 5 stars 4.06  ·  rating details  ·  140 ratings  ·  9 reviews
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engin...more
Paperback, 624 pages
Published April 15th 2005 by John Wiley & Sons
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Community Reviews

(showing 1-30 of 500)
filter  |  sort: default (?)  |  rating details
Andre
One thing that drives me nuts is when an author treats its readers like novices, then doesn't explain more difficult portions of the material.

... reading a book is an exercise in self-reflection. I read this book cover to cover. The author isn't showing you how to play patty cake. The author takes more of an academic approach and expects that you (the reader) will dig into the material more on your own. His job is more like a lecturer. Your job is to put in the work to understand what's going on...more
Gurudatha Pai
The things I learned from MOSFET to digital circuits to microchips to microprocessors to assembly languages to high level languages all made much more sense after reading it.
I did not however learn to reverse engineer software but that is besides the point. The book is dense, it requires the reader to be familiar with many aspects of digital electronics and computer science.
Moshe Zioni
I enjoyed reading Reversing, it was fun and educational.

Problem with this book is that it didn't meat my expectations. It covers a lot of information but it is hard to be as a reference for future reversing (which I hoped to get from ~800 pages). I hoped to get more information related to security, copy-protections and how to break them (knowing is the path to fixing...).

That said, Mr. Eilam put a lot of effort and knowledge into one archive that no one else could have compiled before, and truly...more
Empire539
Great for the technically-minded reader, but can go a bit over the head for those inexperienced with low-level hardware. A light background in computer engineering and/or hardware is suggested before reading, but not completely necessary. The text doesn't go into excruciating detail, but gives you enough information to find your way around. Highly informative for a comp. eng. major like me!
Michael Venzke
worth reading for hardcore programmers, esp people who release software, even if you're not interested in reverse engineering anything.

also good if you're stuck with an undocumented API, or if you're interested in shareware/anti-piracy/security techniques.
Plamen
It has some very good ideas and tricks but there is a lot of bulk in it (I don't like the huge assembly listings from olly).
dersteppenwolf
Libro único en su tema.muy útil para los interesados en seguridad informática
João Júnior
Excellent book for beginners on the subject.
Dumah
Aug 04, 2012 Dumah added it
excellent
Dave
Dave marked it as to-read
Jul 20, 2014
Bintnoor
Bintnoor marked it as to-read
Jul 19, 2014
Tetris
Tetris marked it as to-read
Jul 18, 2014
Josh
Josh marked it as to-read
Jul 16, 2014
Josh
Josh marked it as to-read
Jul 16, 2014
Athena
Athena marked it as to-read
Jul 15, 2014
Ericramirez18
Ericramirez18 marked it as to-read
Jul 14, 2014
Saman
Saman marked it as to-read
Jul 14, 2014
Brenda
Brenda marked it as to-read
Jul 09, 2014
Julie Hendrix
Julie Hendrix marked it as to-read
Jul 07, 2014
Matt
Matt marked it as to-read
Jul 06, 2014
Louis
Louis marked it as to-read
Jul 05, 2014
« previous 1 3 4 5 6 7 8 9 16 17 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Writing Secure Code
  • Hacking: The Art of Exploitation
  • Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed)
  • Metasploit: The Penetration Tester's Guide
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Hacker's Delight
  • Land of LISP: Learn to Program in LISP, One Game at a Time!
  • The Practice of Programming
  • Computer Architecture: A Quantitative Approach
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • Practical Cryptography
  • Programming Language Pragmatics
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • Concepts, Techniques, and Models of Computer Programming
  • Security Engineering: A Guide to Building Dependable Distributed Systems

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
Naked Code: The Ultimate Guide to Programming in Any Language

Share This Book