Must-Read Books and Other References

Books on C/C++:

  • The C Programming Language by Brian W. Kernighan and Dennis M. Ritchie. Prentice Hall, 1988. The author’s description of C as defined by American National Standard Institute (ANSI), also called the “Old Testament.” It is old-fashioned but remains a must-read. This book also has
    a home page: http://cm.bell-labs.com/cm/cs/cbook/index.html.
  • 1001 Visual C++ Programming Tips, first
    edition, by Kris Jamsa. Muska & Lipman, 2001. Not the “Old Testament”, but
    very good.
  • “С++
    Annotations” by Frank B. Brokken (http://www.icce.rug.nl/documents/
    cpp.shtml
    ). This annotated manual on the C++
    programming language is
    a must-read for every self-respecting hacker.
  • “comp.lang.c Frequently Asked
    Questions” by Steve Summit (http://www.eskimo.com/~scs/C-faq/top.html) is the best.

On Assembly:

  • The Art of Assembly Language, first
    edition, by Randall Hyde. No Starch Press, 2003. One of the most highly
    recommended resources on Assembly.
  • Write Great Code: Understanding the Machine, first edition, by Randall Hyde. No Starch Press, 2004. In addition to the
    excellent language description, the book provides information concerning basic
    computer data representation, binary arithmetic and bit operations, memory
    organization and access, Boolean logic, and CPU design.
  • Manuals from Intel and AMD,
    which, by the way, are available not only for free downloading but also for
    ordering by mail (also for free).

On the operating system:

  • SDKs/DDKs from Microsoft,
    containing toolsets and accompanying documentation. You need these software
    products, so go and download them.
  • Advanced Windows, third edition, by
    Jeffrey Richter. Microsoft Press, 1997. This is a Bible of the application
    programmer.
  • Inside the Windows NT File System by
    Helen Custer. Microsoft Press, 1994. An excellent description of the Windows NT
    file system, and a must have.
  • Inside Windows NT by Helen Custer.
    Microsoft Press, 1992. A
    detailed in-depth investigation of the Windows NT 4.0 architecture and
    associated
    coding implications.
  • Microsoft Windows Internals, fourth
    edition, by David Solomon and Mark Russinovich. Microsoft Press, 2004. Written
    by two gurus of the hacker’s community, this classic book is an in-depth guide
    to the Windows kernel. The new edition covers all newest Windows versions,
    including Windows 2000, Windows XP, and Windows .NET Server 2003.
  • Undocumented Windows 2000 Secrets by
    Sven Schreiber. Addison-Wesley Professional, 2001. This book, written by a
    noted investigator of the Windows kernel internals, covers the Windows 2000
    debugging interfaces, symbol files, system memory, and kernel objects; the
    kernel’s native API; Microsoft PDB file format; and other topics.

On disassembling:

  • The Art of Disassembly from the
    Reversing-Engineering Network
    (http://www.reverse-engineering.net/). The bible of the disassembly.
  • Hacker Disassembling Uncovered by Kris
    Kaspersky. A-List Publishing, 2003.
    A hacker’s advice related to how to analyze programs
    without its source code using a debugger and a disassembler.

On hacking:

  • Phrack (http://www.phrack.org). The best e-zine available containing lots of articles, including
    the ones focusing on stack overflow.

On the buffer overflow:

  • UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes (http://opensores.thebunker.net/pub/mirrors/blackhat/presentations/bh-usa-01/LSD/bh-usa-01-lsd.pdf). An excellent
    manual on the buffer overflow technique and gaining control over remote
    computers.
  • Win32 Assembly Components (http://www.lsd-pl.net/documents/winasm-1.0.1.pdf). Ready-to-use components and exploits.
  • Understanding Windows Shellcode (http://www.hick.org/code/skape/papers/win32-shellcode.pdf). Manual on shellcode development.

《黑客反汇编揭秘》(2e)推荐书单的更多相关文章

  1. 学校的统一订书80%该烧掉——IT推荐书单

    学校的统一订书80%该烧掉——IT推荐书单 作者: 夏浅音.py 中文图书个人黑名单:清华大学出版社的国产作者,例如一段错n次的谭浩强.一页错n次的严蔚敏... 中文图书个人白名单:机械工业出版社.电 ...

  2. Android 应用开发推荐书单

    本文由 伯乐在线 - zerob13 翻译自 fromdev.欢迎加入Android小组.转载请参见文章末尾处的要求. Android 已经成为了世界上最受欢迎的操作系统之一.成千上万的智能手机和平板 ...

  3. (转载)Stackoverflow评选的C++推荐书单

    C++必读书籍推荐 (原链接:http://bestcbooks.com/recommended-cpp-books 2013-10-07) 本文内容来自国外著名编程问答网站Stackoverflow ...

  4. 书评第001篇:《C++黑客编程揭秘与防范》

    本书基本信息 作者:冀云(编著) 出版社:人民邮电出版社 出版时间:2012-6-1 ISBN:9787115280640 版次:1 页数:265 字数:406000 印刷时间:2012-6-1 开本 ...

  5. 推荐书单(转自GITHUB)

    Skip to content PersonalOpen sourceBusinessExplore Sign upSign in PricingBlogSupport   This reposito ...

  6. Web前端--黑客技术揭秘(菜鸟知识)

    一,Web安全的关键点 1.同源策略是众多安全策略的一个,是Web层面上的策略.很重要. 2.同源策略规定:不同域的client脚本在没明白授权的情况下.不能读写对方的资源. 3.同域要求两个网站同协 ...

  7. C语言之反汇编揭秘

    title: 'C语言之反汇编揭秘' tags: 汇编与反汇编 categories: 汇编与反汇编 copyright: true abbrlink: 'b1c9' date: 2019-09-07 ...

  8. 推荐书单(网课)-人生/编程/Python/机器学习-130本

    目录 总计(130本) 一.在读 二.将读 三.已读 非专业书单(77本) 四.已读 专业书单(53本) 五.已看网课(8个) 六.在看网课 一个人如果抱着义务的意识去读书,便不了解读书的艺术.--林 ...

  9. [在读]web前端黑客技术揭秘

随机推荐

  1. xcode8.0升级之后公司项目遇到的问题

    xcode8升级之后项目遇到了问题,由于这个项目是我中途接手的,遇到的第三方也是自己没有用过的, AQGridViewCell,这个第三方的类主要是用于处理图片的问题,xcode开发工具升级过后,报这 ...

  2. 数据库管理工具GUI - PremiumSoft Navicat Premium Enterprise 11.2.15 x86/x64 KEY

    转载自: 数据库管理工具GUI - PremiumSoft Navicat Premium Enterprise 11.2.15 x86/x64 KEY Navicat Premium(数据库管理工具 ...

  3. 初识Azkaban

    先说下hadoop 内置工作流的不足 (1)支持job单一 (2)硬编码 (3)无可视化 (4)无调度机制 (5)无容错机制 在这种情况下Azkaban就出现了 1)Azkaban是什么 Azkaba ...

  4. 几大排序算法的Java实现

    很多的面试题都问到了排序算法,中间的算法和思想比较重要,这边我选择了5种常用排序算法并用Java进行了实现.自己写一个模板已防以后面试用到.大家可以看过算法之后,自己去实现一下. 1.冒泡排序:大数向 ...

  5. Oracle SGA优化

    oracle的SGA:数据库的系统全局区,SGA主要由三部分构成:共享池.数据缓冲区.日志缓冲区. 共享池又由两部分构成:共享SQL区和数据字典缓冲区. 共享SQL区专门存放用户SQL命令,oracl ...

  6. 4-1 Linux用户管理命令详解

    1. /etc/passwd 格式 用户名:密码:UID:GID:注释:家目录:默认shell useradd  [options ]    USERNAME -u: UID  要大于等于500, - ...

  7. Mysql 的特殊之处

    互联网公司一般都会选择在互联网得到广泛应用的Mysql,但之前一直用微软的东东,包括数据库(MS SQLServer). 这不本以为切换数据库so easy,但是还是有些细节需要注意. 数据类型 Da ...

  8. jquery ajax在跨域访问post请求的时候,ie9以下无效(包括ie9)

    1. 设置浏览器安全属性,启用[通过域访问数据源]选项,如图:

  9. [No0000A2]“原始印欧语”(PIE)听起来是什么样子?

    "Faux Amis"节目中经常提到"原始印欧语"(PIE)——"Proto-Indo-European". 我们说过,英语,法语中的&qu ...

  10. Unity中脚本的执行顺序总结(@WhiteTaken)

    (Editor)以上是Unity官方文档中的截图,脚本在被挂载到物体上,会启用Editor的方法Reset. (Initialization)当执行脚本开始,初始化的过程中,依次执行的是Awake-& ...