0
17 years of experience17 years of Excellence
SUBJECTS
ADV. SEARCH
Indian Books on Discounts
  Hacker Debugging Uncovered
 

Hacker Debugging Uncovered

by Kris Kaspersky

  Price : Rs 399.00
  Your Price : Rs 339.15
Discount
15
In Stock
  Description: Tips for the practical use of debuggers, such as NuMega Softice, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in the code-digger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstrated. Programmers will learn how to look at what is inside a computer system, how to reconstruct the operating algorithm of a program distributed without source code, how to modify the program, and how to debut drivers. The use of debugging applications and drivers in Windows and Unix operating systems on Intel Pentium/DEC Alpha-based processors is also detailed. The book is oriented toward most programmers with intermediate skills in C/C++ or Pascal/Delphi languages. Knowledge of assembly language and a fundamental understanding of processor and operating system architecture will be beneficial.

Table of Contents:
Part 1: Getting Started with Debugging Tools
Chapter 1: Introduction to Debugging Tools
Chapter 2: Specific Features of Debugging under UNIX
Chapter 3: Emulating Debuggers and Emulators
Chapter 4: Applications Analysis Using Bounds Cheker

Part 2: Protection Mechanisms and Debugging Them
Chapter 5: Introduction to Protection Mechanisms
Chapter 6: Getting Acquainted with the Debugger
Chapter 7: IDA Emerges on the Scene
Chapter 8: The TAO of Registration Protection Mechanisms
Chapter 9: Hashingand How to Overcome it
Chapter 10: Popular Protection Mechanisms

Part 3: Ant debugging Techniques
Chapter 11: Introduction to antidebugging Techniques
Chapter 12: Various Antidebugging Techniques
Chapter 13: UNIX- Specific Antidebugging Techniques
Chapter 14: Self-Modifying Code
Chapter 15: Using Implicit Self-Control- To create uncrackable protection
Chapter 16: Mental Debugging
Chapter 17: Software Protection
Chapter 18: How to Make Your Programs more Reliable
Chapter 19: Software Testing

Part 4: Critical Errors of Applications and Operating System
Chapter 20: Inhabitants of the Somber Zone, or From Morgue to Reanimation
Chapter 22: How to Utilize a memory Dump

Part 5: PE Files
Chapter 23: PE Files Format
Chapter 24: Techniques for Inserting and Removing Code into/from PE Files
Index

The companion CD: It contains the source code of all listings provided in the book high-quality instructive illustrations and useful utilities
 


Pages : 612
Credit Cards
Payment accepted by All Major Credit and Debit Cards, Net Banking, Cash Cards, Paytm, UPI, Paypal. Our payment gateways are 100% secure.
Check Delivery
Books of Similar Interest
15%
Personal Oracle RAC clusters: Create Oracle 10g Grid Computing At- Home
by Stoever
15%
Ajax: A Beginner`s Guide 1/e
by Holzner
Compiler Construction, 2nd Edition
by Dhamdhere
Webster`s New World Dictionary Of Computer Terms
by NA
15%
Computer Science - A Structured Programming Approach Using C, 1/e
by Behrouz A. Forouzan
Best Book Mart
Support

Call Us Phone : +91-9266663909
Email Us Email : support [at] bestbookmart.com
Working Hours Timing : 10:00 AM to 6:00 PM (Mon-Fri)
Powered By
CCAvenue
SSL Protection