The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more.
That's exactly what this book shows you how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts.
Arbitrary-code execution vulnerabilities still allow attackers to run code of their choice on your system—with disastrous results. In a nutshell, this book is about code and data and what happens when the two become confused.
What You'll LearnUnderstand the theoretical underpinnings of automatic memory management Take a deep dive into every aspect of .NET memory management, including detailed coverage of garbage collection (GC) implementation, that would ...
Use this in-depth guide to correctly design benchmarks, measure key performance metrics of .NET applications, and analyze results. This book presents dozens of case studies to help you understand complicated benchmarking topics.
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it ...
And because it’s C# end-to-end, it’s easy to share code between the server and your web UI. About the book Blazor in Action teaches you to create full-stack ASP.NET applications end-to-end in C#. You’ll start by learning to build ...
In this book, you’ll use Razor Pages to build a complete application for booking city breaks, learning to iterate amazing new features chapter-by-chapter.