Reverse engineering code with IDA Pro
2008
Chapter 1: Introduction to IDA ProChapter 2: Installing IDA Pro on Windows, OS X, and LinuxChapter 3: Learning the IDA Pro InterfaceChapter 4: Analyzing Worms, Viruses, and TrojansChapter 5: IDA Pro as a DisassemblerChapter 6: IDA Pro as a DebuggerChapter 7: Breaking Hostile Code ArmorChapter 8: Reversing Obfuscation in Hostile CodeChapter 9: Automating IDA Pro with MacrosChapter 10: Writing your Own Exploits
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
14
Citations
NaN
KQI