Newsletter   Secure Checkout   Shopping Cart (0 Items)  
Search:    Welcome Guest! Save up to 30-40% on most items with our awesome everyday discounts!

Hacker Disassembling Uncovered (Uncovered series) [Paperback]

Our Price $ 31.50  
Retail Value $ 45.00  
You Save $ 13.50  (30%)  
Item Number 258892  
Buy New $31.50
Out Of Stock!
Currently Out Of Stock
Currently unavailable...

Item description for Hacker Disassembling Uncovered (Uncovered series) by Kris Kaspersky...

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of how to go about disassembling a program with holeswithout its source code. Detailing hacking methodsused to analyzeprograms using a debugger and disassembler such as virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators, this guidecovers methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well, and aCD-ROM that contains illustrations and the source codes for the programs is also included.

Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at!

Item Specifications...

Pages   550
Est. Packaging Dimensions:   Length: 9.1" Width: 7.2" Height: 1.4"
Weight:   2.16 lbs.
Binding  Softcover
Release Date   Feb 1, 2007
Publisher   A-List Publishing
ISBN  1931769648  
ISBN13  9781931769648  

Availability  0 units.

More About Kris Kaspersky

Register your artisan biography and upload your photo! Kris Kaspersky is the author of articles on hacking, disassembling, and code optimization. He has dealt with issues relating to security and system programming including compiler development, optimization techniques, security mechanism research, real-time OS kernel creation, and writing antivirus programs.

Are You The Artisan or Author behind this product?
Improve our customers experience by registering for an Artisan Biography Center Homepage.

Product Categories

1Books > Special Features > New & Used Textbooks > Computer Science & Information Systems > Programming Languages
2Books > Subjects > Computers & Internet > Computer Science > Systems Analysis & Design
3Books > Subjects > Computers & Internet > Digital Business & Culture > Hackers
4Books > Subjects > Computers & Internet > General
5Books > Subjects > Computers & Internet > Programming > General
6Books > Subjects > Computers & Internet > Programming > Languages & Tools > Compiler Design
7Books > Subjects > Computers & Internet > Programming > Languages & Tools > Compilers
8Books > Subjects > Computers & Internet > Programming > Software Design > Testing
9Books > Subjects > Computers & Internet > Web Development > Security & Encryption > Encryption

Reviews - What do customers think about Hacker Disassembling Uncovered (Uncovered series)?

Delivers what others promise  Aug 18, 2006
This has the most straightforward exposition of exploits.
I used the info as the basis of a testing framework.
Kris knows his stuff and shares. This book delivers,
but make sure you've got you're brain on and be
prepared to find and use the external resource.

you don't absolutely need the tools he suggests
for all the exploits covered, but they will make
the task a lot easier, and are therefore worth it
for the time they save you writing your own.
This book is aimed at professional's.
Excellent book, highly recommended!  May 4, 2006
This book is fantastic- one of a kind, by far :)

Provided you've covered the basics, x86 assembly language- and C++, this book will teach you some of the absolute essential skills required in reversing commercial-level software. This book isn't a toy- it's the real thing, for serious programmers, researchers and experts in the field.

It has a step by step introduction- and builds firmly upon previous chapters- covering various compilers; and how they generate serveral of the common constructs found in Higher Level languages. The section of Virtual Functions is a dime; combined with structures, arrays and many other important elements.

A lot of work has gone into this book, and it definately shows.

One reviewer gave this book a low rating, and claimed- "I had a no luck getting SoftICE to run correctly on Windows XP". That has got nothing to do with the author of the quality of this book. If you searched[..], you'll find there exists several patches you can get to make it run on Windows XP; IDA pro is availible commercially aswell, and dumpbin is provided with Visual Studio.

It's an absolute winner for those wanting to go deeper into the core of computers/software.

fair intro to disassembly  Jul 13, 2005
I give the author credit for a decent intro to disassembly, but it's a difficult path with this book. Expensive tools are assumed to be available (no reference is made to free alternatives), and less than subtle remarks about using these tools to make commercial software "free".

Later chapters do get more in-depth, and more useful.
Step-by-step  Feb 26, 2005
The best part about this book is that besides all of the neat tricks it gives you, the layout is step-by-step. You can sit down with it using the CD and go through each exercise. I have recommended this book to all of my friends/co-workers that are either learning how to protect software they write to how to identify vulnerabilities in other programs. Knowing assembly helps, but this also presents it in a way that you can learn as you go.
Excellent introduction to the subject  Jan 20, 2005
Copy protection schemes are to software as locks are to doors: they keep honest people out. This book provides the first insight into the science of disassembling object code for the reader who has been disinclined to search for hacker web sites and zines.

With a topic this large, the author can be forgiven for presenting only a limited set of examples: C, C++, Pascal on Windows. He shows how to use commercial tools to disassemble object code into assembler and how to identify program structures there, with particular emphasis on language features that produce non-intuitive structures.

Topics covered include: cracking passwords, identifying key structures in high level languages (the bulk of the book) and how to make your code difficult to analyse using these methods.

The structures examined include IF-THEN-ELSE, SWITCH-CASE-BREAK, objects, structures, arrays, constants, offsets and variables. The reader is shown how to recognise these objects. Explanations are complete and involve no handwaving.

A good solid introductory text.

Write your own review about Hacker Disassembling Uncovered (Uncovered series)

Ask A Question or Provide Feedback regarding Hacker Disassembling Uncovered (Uncovered series)

Item Feedback and Product Questions
For immediate assistance call 888.395.0572 during the hours of 10am thru 8pm EST Monday thru Friday and a customer care representative will be happy to help you!

Help us continuously improve our service by reporting your feedback or questions below:

I have a question regarding this product
The information above is incorrect or conflicting
The page has misspellings or incorrect grammar
The page did not load correctly in my browser or created an error.

Email Address:
Anti Spam Question. To combat spammers we require that you answer a simple question.
What color is the sky?
Leave This Blank :
Do Not Change This Text :

Add This Product Widget To Your Website

Looking to add this information to your own website? Then use our Product Widget to allow you to display product information in a frame that is 120 pixels wide by 240 pixels high.

    Copy and paste the following HTML into your website and enjoy!

Order toll-free weekdays 10am thru 10pm EST by phone: 1-888-395-0572 (Lines are closed on holidays & weekends.)
Customer Service | My Account | Track My Orders | Return Policy | Request Free Catalog | Email Newsletter

Gift Certificates
RSS Feeds
About Us
Contact Us
Terms Of Use
Privacy Policy