Rating:  Summary: Step-by-step Review: The best part about this book is that besides all of the neat tricks it gives you, the layout is step-by-step. You can sit down with it using the CD and go through each exercise. I have recommended this book to all of my friends/co-workers that are either learning how to protect software they write to how to identify vulnerabilities in other programs. Knowing assembly helps, but this also presents it in a way that you can learn as you go.
Rating:  Summary: Great book!! Review: there are a lot of awesome hacks in this book.there is a of great code. I highly recommend this book.
Rating:  Summary: Very Good ( BEST ) Review: This book will make you evil and suggested to people who curious about binary audit. I think the author revealed too much but it's good for us to have a better secure software and good combination with shellcoders handbook.
Rating:  Summary: The Best Book about Reverse Engineering Review: This is a must have for people interesting in reverse engineering
Rating:  Summary: Could be called "Cracker Disassembling Uncovered"... Review: While I agree with all many of the other reviewers here, I have to profess that I thought many of the main topic areas really weren't consistent with hacking. The author takes great pains to write in terms of the circumvention of copy protection mechanisms such as passwords and serial numbers. While I will admit the author demostrates an exceptional knowledge of assembly code and debugging, it would have been nice if he covered a more diverse set of examples. Regardless, taking this book for what it's worth, I would say if you read closely and experiment with the recommended tools you'll take away a far greater understanding of assembly code and the debugging process.
|