Goodreads helps you keep track of books you want to read.
Start by marking “The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler” as Want to Read:
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
Enlarge cover
Rate this book
Clear rating
Open Preview

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler

4.43  ·  Rating Details ·  92 Ratings  ·  3 Reviews
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the c
...more
Paperback, 640 pages
Published August 19th 2008 by No Starch Press (first published August 12th 2008)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about The IDA Pro Book, please sign up.

Be the first to ask a question about The IDA Pro Book

Community Reviews

(showing 1-30 of 311)
filter  |  sort: default (?)  |  Rating Details
Alex Allain
Jan 04, 2009 Alex Allain rated it it was amazing
This book is incredibly useful for users of IDA pro. I've used IDA for several years, but I dog-eared at least sixteen pages that contain immediately actionable information, and I learned at least two other valuable pieces of information. Each of these bits of information are probably worth the cost of the book.
Matt
Mar 27, 2013 Matt rated it it was amazing  ·  review of another edition
One of the best written technical books I've read, alongside Steven's TCP/IP Illustrated. Clearly explained extremely technical subjects in a very readable and enjoyable manner. If you use IDA, you must read this book.
Jason Copenhaver
Jul 28, 2013 Jason Copenhaver rated it really liked it  ·  review of another edition
Excellent book. If you plan to spend anytime at all in IDAPro you should read this book. The last few chapters are very introductory topics that are better covered in other books but still worth glancing at.
Jon
Jon marked it as to-read
Sep 20, 2016
AJ Dexter
AJ Dexter rated it really liked it
Sep 19, 2016
Kukuh Prabowo
Kukuh Prabowo rated it it was amazing
Sep 18, 2016
DizZet
DizZet marked it as to-read
Sep 11, 2016
Michael
Michael marked it as to-read
Sep 10, 2016
Merger
Merger rated it liked it
Sep 08, 2016
Amani
Amani marked it as to-read
Sep 08, 2016
Sergey Kochergan
Sergey Kochergan marked it as to-read
Sep 03, 2016
Marco Constantino
Marco Constantino marked it as to-read
Aug 31, 2016
Gabrielle Tjauw
Gabrielle Tjauw rated it it was amazing
Aug 31, 2016
Michael Ettlinger
Michael Ettlinger rated it liked it
Aug 30, 2016
The Viet Nguyen
The Viet Nguyen marked it as to-read
Aug 28, 2016
David Rose
David Rose marked it as to-read
Aug 20, 2016
Ricky Ho
Ricky Ho marked it as to-read
Aug 19, 2016
James Lyne
James Lyne rated it really liked it
Aug 19, 2016
somalisketch
somalisketch marked it as to-read
Sep 05, 2016
Amatur
Amatur marked it as to-read
Aug 16, 2016
Navtej Singh
Navtej Singh marked it as to-read
Aug 09, 2016
Spongebubble
Spongebubble marked it as to-read
Aug 05, 2016
Fotis Koutoulakis
Fotis Koutoulakis marked it as to-read
Jul 25, 2016
Khan
Khan marked it as to-read
Jul 25, 2016
قرش العرب
قرش العرب rated it really liked it
Jul 22, 2016
Walique
Walique rated it really liked it
Jul 19, 2016
Sean Williams
Sean Williams marked it as to-read
Jul 18, 2016
Abuzar
Abuzar marked it as to-read
Jul 16, 2016
Ron
Ron added it
Jul 15, 2016
Joshua Rogers
Joshua Rogers marked it as to-read
Jul 07, 2016
« previous 1 3 4 5 6 7 8 9 10 11 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Reversing: Secrets of Reverse Engineering
  • The Art of Assembly Language
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Metasploit: The Penetration Tester's Guide
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
  • Rootkits: Subverting the Windows Kernel
  • Rtfm: Red Team Field Manual

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book