Are you a security analyst, developer, or engineer who wants to understand software beneath the surface — not just in theory, but in practice? Have you ever stared at a compiled binary, firmware image, or network trace and wondered how to make sense of it? This book is your step-by-step guide to professional reverse engineering.
Inside, you’ll learn how to unpack binaries, map control flow, recover data formats, trace runtime behavior, and extract actionable artifacts — all explained in clear, hands-on language with realistic examples. Unlike scattered tutorials, this book presents a reliable workflow you can apply to new challenges with confidence.
Designed for security analysts investigating malware or incidents, developers auditing or hardening applications, engineers maintaining legacy systems, and students bridging theory and practice, it teaches practical workflows, safe lab setups, and ethical methods for analysis. You’ll also gain checklists, reporting templates, and exercises to help build professional, audit-ready skills.
By the end, you’ll be able to systematically analyze unknown software, counter obfuscation, extract meaningful data from memory and network traces, and translate low-level behaviors into actionable findings. This book offers a clear path from curiosity to capability — a printed apprenticeship with proven methods, hands-on exercises, and practical tools.
Start decoding, understanding, and securing software systems — one logical, step-by-step method at a time.
"synopsis" may belong to another edition of this title.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 51850202-n
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Print on Demand. Seller Inventory # I-9798273492707
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 51850202
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9798273492707
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9798273492707
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 51850202-n
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 51850202
Quantity: Over 20 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. Are you a security analyst, developer, or engineer who wants to understand software beneath the surface - not just in theory, but in practice? Have you ever stared at a compiled binary, firmware image, or network trace and wondered how to make sense of it? This book is your step-by-step guide to professional reverse engineering.Inside, you'll learn how to unpack binaries, map control flow, recover data formats, trace runtime behavior, and extract actionable artifacts - all explained in clear, hands-on language with realistic examples. Unlike scattered tutorials, this book presents a reliable workflow you can apply to new challenges with confidence.Designed for security analysts investigating malware or incidents, developers auditing or hardening applications, engineers maintaining legacy systems, and students bridging theory and practice, it teaches practical workflows, safe lab setups, and ethical methods for analysis. You'll also gain checklists, reporting templates, and exercises to help build professional, audit-ready skills.By the end, you'll be able to systematically analyze unknown software, counter obfuscation, extract meaningful data from memory and network traces, and translate low-level behaviors into actionable findings. This book offers a clear path from curiosity to capability - a printed apprenticeship with proven methods, hands-on exercises, and practical tools.Start decoding, understanding, and securing software systems - one logical, step-by-step method at a time. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9798273492707
Quantity: 1 available