Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Foundations of Linux debugging, disa...
~
Vostokov, Dmitry.
Linked to FindBook
Google Book
Amazon
博客來
Foundations of Linux debugging, disassembling, and reversing = analyze binary code, understand stack memory usage, and reconstruct C/C++ code with Intel x64 /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Foundations of Linux debugging, disassembling, and reversing/ by Dmitry Vostokov.
Reminder of title:
analyze binary code, understand stack memory usage, and reconstruct C/C++ code with Intel x64 /
Author:
Vostokov, Dmitry.
Published:
Berkeley, CA :Apress : : 2023.,
Description:
xiv, 173 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter One - x64.1: Memory, Registers, and Simple Arithmetic -- Chapter Two - x64.2: Code Optimization -- Chapter Three - x64.3: Number Representations -- Chapter Four - x64.4: Pointers -- Chapter Five - x64.5: Bytes, Words, Double, and Quad Words -- Chapter Six - x64.6: Pointers to Memory -- Chapter Seven - x64.7: Logical Instructions and RIP -- Chapter Eight - x64.8: Reconstructing a Program with Pointers -- Chapter Nine - x64.9: Memory and Stacks -- Chapter Ten - x64.10: Frame Pointer and Local Variables -- Chapter Eleven - x64.11: Function Parameters -- Chapter Twelve - x64.12: More Instructions -- Chapter Thirteen - x64.13: Function Pointer Parameters -- Chapter Fourteen - x64.14: Summary of Code Disassembly Patterns.
Contained By:
Springer Nature eBook
Subject:
Operating systems (Computers) -
Online resource:
https://doi.org/10.1007/978-1-4842-9153-5
ISBN:
9781484291535
Foundations of Linux debugging, disassembling, and reversing = analyze binary code, understand stack memory usage, and reconstruct C/C++ code with Intel x64 /
Vostokov, Dmitry.
Foundations of Linux debugging, disassembling, and reversing
analyze binary code, understand stack memory usage, and reconstruct C/C++ code with Intel x64 /[electronic resource] :by Dmitry Vostokov. - Berkeley, CA :Apress :2023. - xiv, 173 p. :ill., digital ;24 cm.
Chapter One - x64.1: Memory, Registers, and Simple Arithmetic -- Chapter Two - x64.2: Code Optimization -- Chapter Three - x64.3: Number Representations -- Chapter Four - x64.4: Pointers -- Chapter Five - x64.5: Bytes, Words, Double, and Quad Words -- Chapter Six - x64.6: Pointers to Memory -- Chapter Seven - x64.7: Logical Instructions and RIP -- Chapter Eight - x64.8: Reconstructing a Program with Pointers -- Chapter Nine - x64.9: Memory and Stacks -- Chapter Ten - x64.10: Frame Pointer and Local Variables -- Chapter Eleven - x64.11: Function Parameters -- Chapter Twelve - x64.12: More Instructions -- Chapter Thirteen - x64.13: Function Pointer Parameters -- Chapter Fourteen - x64.14: Summary of Code Disassembly Patterns.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, you'll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You'll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. You will: Review the basics of x64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used.
ISBN: 9781484291535
Standard No.: 10.1007/978-1-4842-9153-5doiSubjects--Uniform Titles:
Linux.
Subjects--Topical Terms:
539553
Operating systems (Computers)
LC Class. No.: QA76.8.L56 / V67 2023
Dewey Class. No.: 005.432
Foundations of Linux debugging, disassembling, and reversing = analyze binary code, understand stack memory usage, and reconstruct C/C++ code with Intel x64 /
LDR
:03597nmm a2200325 a 4500
001
2316494
003
DE-He213
005
20230130151644.0
006
m d
007
cr nn 008maaau
008
230902s2023 cau s 0 eng d
020
$a
9781484291535
$q
(electronic bk.)
020
$a
9781484291528
$q
(paper)
024
7
$a
10.1007/978-1-4842-9153-5
$2
doi
035
$a
978-1-4842-9153-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.8.L56
$b
V67 2023
072
7
$a
U
$2
bicssc
072
7
$a
COM051390
$2
bisacsh
072
7
$a
ULJ
$2
thema
082
0 4
$a
005.432
$2
23
090
$a
QA76.8.L56
$b
V971 2023
100
1
$a
Vostokov, Dmitry.
$3
3629772
245
1 0
$a
Foundations of Linux debugging, disassembling, and reversing
$h
[electronic resource] :
$b
analyze binary code, understand stack memory usage, and reconstruct C/C++ code with Intel x64 /
$c
by Dmitry Vostokov.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiv, 173 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter One - x64.1: Memory, Registers, and Simple Arithmetic -- Chapter Two - x64.2: Code Optimization -- Chapter Three - x64.3: Number Representations -- Chapter Four - x64.4: Pointers -- Chapter Five - x64.5: Bytes, Words, Double, and Quad Words -- Chapter Six - x64.6: Pointers to Memory -- Chapter Seven - x64.7: Logical Instructions and RIP -- Chapter Eight - x64.8: Reconstructing a Program with Pointers -- Chapter Nine - x64.9: Memory and Stacks -- Chapter Ten - x64.10: Frame Pointer and Local Variables -- Chapter Eleven - x64.11: Function Parameters -- Chapter Twelve - x64.12: More Instructions -- Chapter Thirteen - x64.13: Function Pointer Parameters -- Chapter Fourteen - x64.14: Summary of Code Disassembly Patterns.
520
$a
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, you'll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You'll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. You will: Review the basics of x64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used.
630
0 0
$a
Linux.
$3
539555
650
0
$a
Operating systems (Computers)
$3
539553
650
0
$a
Open source software.
$3
581998
650
0
$a
Debugging in computer science.
$3
590474
650
1 4
$a
Open Source.
$3
2210577
650
2 4
$a
Operating Systems.
$3
892491
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9153-5
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9452744
電子資源
11.線上閱覽_V
電子書
EB QA76.8.L56 V67 2023
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login