Goodreads helps you keep track of books you want to read.
Start by marking “Reversing: Secrets of Reverse Engineering” as Want to Read:
Reversing: Secrets of Reverse Engineering
Enlarge cover
Rate this book
Clear rating
Open Preview

Reversing: Secrets of Reverse Engineering

4.02  ·  Rating details ·  416 Ratings  ·  11 Reviews
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engi
...more
Paperback, 624 pages
Published April 15th 2005 by Wiley
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Reversing, please sign up.

Be the first to ask a question about Reversing

Community Reviews

(showing 1-30)
Rating details
Sort: Default
|
Filter
Andre
May 02, 2012 rated it liked it
One thing that drives me nuts is when an author treats its readers like novices, then doesn't explain more difficult portions of the material.

... reading a book is an exercise in self-reflection. I read this book cover to cover. The author isn't showing you how to play patty cake. The author takes more of an academic approach and expects that you (the reader) will dig into the material more on your own. His job is more like a lecturer. Your job is to put in the work to understand what's going on
...more
Moshe Zioni
I enjoyed reading Reversing, it was fun and educational.

Problem with this book is that it didn't meat my expectations. It covers a lot of information but it is hard to be as a reference for future reversing (which I hoped to get from ~800 pages). I hoped to get more information related to security, copy-protections and how to break them (knowing is the path to fixing...).

That said, Mr. Eilam put a lot of effort and knowledge into one archive that no one else could have compiled before, and truly
...more
K
Aug 27, 2012 rated it it was amazing
Shelves: technical, on-hold
Great for the technically-minded reader, but can go a bit over the head for those inexperienced with low-level hardware. A light background in computer engineering and/or hardware is suggested before reading, but not completely necessary. The text doesn't go into excruciating detail, but gives you enough information to find your way around. Highly informative for a comp. eng. major like me!
Gurudatha Pai
Jun 15, 2014 rated it really liked it
The things I learned from MOSFET to digital circuits to microchips to microprocessors to assembly languages to high level languages all made much more sense after reading it.
I did not however learn to reverse engineer software but that is besides the point. The book is dense, it requires the reader to be familiar with many aspects of digital electronics and computer science.
Michael Venzke
Jul 30, 2007 rated it liked it
Shelves: technical
worth reading for hardcore programmers, esp people who release software, even if you're not interested in reverse engineering anything.

also good if you're stuck with an undocumented API, or if you're interested in shareware/anti-piracy/security techniques.
João Júnior
May 17, 2013 rated it really liked it
Excellent book for beginners on the subject.
Daniel Galassi
May 13, 2013 rated it liked it
Shelves: professional
I found this book interesting, quite bulky though and the style in which it is written does not make it an easy read.
Dumah
Jul 07, 2012 added it
excellent
Masa Nishimura
Aug 17, 2015 rated it really liked it
Shelves: half-read, science
Though it was slightly out of my use case, I definitely saw the value in that specific domain. He walks you through of how part in a concise manner.
Suvaditya
Jul 27, 2016 rated it liked it
Good Book for Learning Reversing
dersteppenwolf
Mar 02, 2012 rated it really liked it
Libro único en su tema.muy útil para los interesados en seguridad informática
Rahul Dé
rated it it was amazing
Oct 23, 2013
jbs
rated it it was amazing
Jun 11, 2012
Rohan
rated it liked it
May 20, 2016
Vedant
rated it liked it
Apr 25, 2016
Jitesh
rated it really liked it
Jun 13, 2016
Viswanathan
rated it liked it
Apr 16, 2015
Aldila N
rated it it was amazing
Jun 25, 2015
Johan Linde
rated it really liked it
Apr 18, 2015
Saad
rated it really liked it
Oct 02, 2015
Fahad Saeed
rated it it was amazing
Nov 09, 2014
Nagesh
rated it it was amazing
Mar 18, 2013
Julia
rated it it was amazing
Jun 15, 2015
Andre
rated it really liked it
May 23, 2013
Daniel
rated it it was amazing
Feb 23, 2015
Willyantho Willyantho
rated it it was amazing
Dec 26, 2009
Brandon Brown
rated it it was amazing
Nov 30, 2017
Zess
rated it it was amazing
Oct 21, 2016
Andrew Douma
rated it really liked it
Jun 26, 2016
Ammar
rated it it was amazing
Aug 25, 2012
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
  • Writing Secure Code
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Rootkits: Subverting the Windows Kernel
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Metasploit: The Penetration Tester's Guide
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Hacking: The Art of Exploitation
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »