About our used conditions ratings:
·Like New: An apparently unread copy in excellent condition. The dust cover is intact, and the pages are clean and not marred by notes or folds of any kind.
·Very Good: A copy that has been read, but remains in excellent condition. May have writing on the inside cover but pages are unmarred.
·Good: A copy that has been read, but remains in clean condition. All pages and covers are intact. The spine may show signs of wear. Pages can include limited notes and highlighting, and the copy can include "From the library of" labels or previous owner inscriptions.
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler. These methods include virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. Also covered are methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well.
2.24 pounds