Goodreads helps you keep track of books you want to read.
Start by marking “Reversing: Secrets of Reverse Engineering” as Want to Read:
Reversing: Secrets of Reverse Engineering
Enlarge cover
Rate this book
Clear rating
Open Preview

Reversing: Secrets of Reverse Engineering

4.01 of 5 stars 4.01  ·  rating details  ·  245 ratings  ·  9 reviews
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engin
Paperback, 624 pages
Published April 15th 2005 by Wiley
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Reversing, please sign up.

Be the first to ask a question about Reversing

Community Reviews

(showing 1-30 of 869)
filter  |  sort: default (?)  |  rating details
One thing that drives me nuts is when an author treats its readers like novices, then doesn't explain more difficult portions of the material.

... reading a book is an exercise in self-reflection. I read this book cover to cover. The author isn't showing you how to play patty cake. The author takes more of an academic approach and expects that you (the reader) will dig into the material more on your own. His job is more like a lecturer. Your job is to put in the work to understand what's going on
Gurudatha Pai
The things I learned from MOSFET to digital circuits to microchips to microprocessors to assembly languages to high level languages all made much more sense after reading it.
I did not however learn to reverse engineer software but that is besides the point. The book is dense, it requires the reader to be familiar with many aspects of digital electronics and computer science.
Moshe Zioni
I enjoyed reading Reversing, it was fun and educational.

Problem with this book is that it didn't meat my expectations. It covers a lot of information but it is hard to be as a reference for future reversing (which I hoped to get from ~800 pages). I hoped to get more information related to security, copy-protections and how to break them (knowing is the path to fixing...).

That said, Mr. Eilam put a lot of effort and knowledge into one archive that no one else could have compiled before, and truly
Great for the technically-minded reader, but can go a bit over the head for those inexperienced with low-level hardware. A light background in computer engineering and/or hardware is suggested before reading, but not completely necessary. The text doesn't go into excruciating detail, but gives you enough information to find your way around. Highly informative for a comp. eng. major like me!
Michael Venzke
worth reading for hardcore programmers, esp people who release software, even if you're not interested in reverse engineering anything.

also good if you're stuck with an undocumented API, or if you're interested in shareware/anti-piracy/security techniques.
I found this book interesting, quite bulky though and the style in which it is written does not make it an easy read.
Libro único en su tema.muy útil para los interesados en seguridad informática
João Júnior
Excellent book for beginners on the subject.
Aug 04, 2012 Dumah added it
Brian marked it as to-read
Aug 28, 2015
Clinton Sites
Clinton Sites marked it as to-read
Aug 24, 2015
Noone6713 marked it as to-read
Aug 24, 2015
Brandon M.
Brandon M. marked it as to-read
Aug 23, 2015
Todd marked it as to-read
Aug 23, 2015
Tom marked it as to-read
Aug 22, 2015
Hassan Bouba
Hassan Bouba marked it as to-read
Aug 20, 2015
Swapnil marked it as to-read
Aug 20, 2015
Masatoshi Nishimura
Masatoshi Nishimura marked it as to-read
Aug 17, 2015
Grittly marked it as to-read
Aug 17, 2015
David Donathan
David Donathan marked it as to-read
Aug 15, 2015
Jeffreymackey marked it as to-read
Aug 11, 2015
Jeremy Franzen
Jeremy Franzen marked it as to-read
Aug 09, 2015
Shirley marked it as to-read
Aug 05, 2015
John Korovessis
John Korovessis marked it as to-read
Aug 05, 2015
« previous 1 3 4 5 6 7 8 9 28 29 next »
There are no discussion topics on this book yet. Be the first to start one »
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Writing Secure Code
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Rootkits: Subverting the Windows Kernel
  • Metasploit: The Penetration Tester's Guide
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Hacking: The Art of Exploitation
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • The Protocols (TCP/IP Illustrated, Volume 1)

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
Naked Code: The Ultimate Guide to Programming in Any Language

Share This Book