Reverse engineering code with IDA Pro

2008 
Chapter 1: Introduction to IDA ProChapter 2: Installing IDA Pro on Windows, OS X, and LinuxChapter 3: Learning the IDA Pro InterfaceChapter 4: Analyzing Worms, Viruses, and TrojansChapter 5: IDA Pro as a DisassemblerChapter 6: IDA Pro as a DebuggerChapter 7: Breaking Hostile Code ArmorChapter 8: Reversing Obfuscation in Hostile CodeChapter 9: Automating IDA Pro with MacrosChapter 10: Writing your Own Exploits
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    14
    Citations
    NaN
    KQI
    []