Must-Read Books and Other References

Books on C/C++:

  • The C Programming Language by Brian W. Kernighan and Dennis M. Ritchie. Prentice Hall, 1988. The author’s description of C as defined by American National Standard Institute (ANSI), also called the “Old Testament.” It is old-fashioned but remains a must-read. This book also has
    a home page: http://cm.bell-labs.com/cm/cs/cbook/index.html.
  • 1001 Visual C++ Programming Tips, first
    edition, by Kris Jamsa. Muska & Lipman, 2001. Not the “Old Testament”, but
    very good.
  • “С++
    Annotations” by Frank B. Brokken (http://www.icce.rug.nl/documents/
    cpp.shtml
    ). This annotated manual on the C++
    programming language is
    a must-read for every self-respecting hacker.
  • “comp.lang.c Frequently Asked
    Questions” by Steve Summit (http://www.eskimo.com/~scs/C-faq/top.html) is the best.

On Assembly:

  • The Art of Assembly Language, first
    edition, by Randall Hyde. No Starch Press, 2003. One of the most highly
    recommended resources on Assembly.
  • Write Great Code: Understanding the Machine, first edition, by Randall Hyde. No Starch Press, 2004. In addition to the
    excellent language description, the book provides information concerning basic
    computer data representation, binary arithmetic and bit operations, memory
    organization and access, Boolean logic, and CPU design.
  • Manuals from Intel and AMD,
    which, by the way, are available not only for free downloading but also for
    ordering by mail (also for free).

On the operating system:

  • SDKs/DDKs from Microsoft,
    containing toolsets and accompanying documentation. You need these software
    products, so go and download them.
  • Advanced Windows, third edition, by
    Jeffrey Richter. Microsoft Press, 1997. This is a Bible of the application
    programmer.
  • Inside the Windows NT File System by
    Helen Custer. Microsoft Press, 1994. An excellent description of the Windows NT
    file system, and a must have.
  • Inside Windows NT by Helen Custer.
    Microsoft Press, 1992. A
    detailed in-depth investigation of the Windows NT 4.0 architecture and
    associated
    coding implications.
  • Microsoft Windows Internals, fourth
    edition, by David Solomon and Mark Russinovich. Microsoft Press, 2004. Written
    by two gurus of the hacker’s community, this classic book is an in-depth guide
    to the Windows kernel. The new edition covers all newest Windows versions,
    including Windows 2000, Windows XP, and Windows .NET Server 2003.
  • Undocumented Windows 2000 Secrets by
    Sven Schreiber. Addison-Wesley Professional, 2001. This book, written by a
    noted investigator of the Windows kernel internals, covers the Windows 2000
    debugging interfaces, symbol files, system memory, and kernel objects; the
    kernel’s native API; Microsoft PDB file format; and other topics.

On disassembling:

  • The Art of Disassembly from the
    Reversing-Engineering Network
    (http://www.reverse-engineering.net/). The bible of the disassembly.
  • Hacker Disassembling Uncovered by Kris
    Kaspersky. A-List Publishing, 2003.
    A hacker’s advice related to how to analyze programs
    without its source code using a debugger and a disassembler.

On hacking:

  • Phrack (http://www.phrack.org). The best e-zine available containing lots of articles, including
    the ones focusing on stack overflow.

On the buffer overflow:

  • UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes (http://opensores.thebunker.net/pub/mirrors/blackhat/presentations/bh-usa-01/LSD/bh-usa-01-lsd.pdf). An excellent
    manual on the buffer overflow technique and gaining control over remote
    computers.
  • Win32 Assembly Components (http://www.lsd-pl.net/documents/winasm-1.0.1.pdf). Ready-to-use components and exploits.
  • Understanding Windows Shellcode (http://www.hick.org/code/skape/papers/win32-shellcode.pdf). Manual on shellcode development.

《黑客反汇编揭秘》(2e)推荐书单的更多相关文章

  1. 学校的统一订书80%该烧掉——IT推荐书单

    学校的统一订书80%该烧掉——IT推荐书单 作者: 夏浅音.py 中文图书个人黑名单:清华大学出版社的国产作者,例如一段错n次的谭浩强.一页错n次的严蔚敏... 中文图书个人白名单:机械工业出版社.电 ...

  2. Android 应用开发推荐书单

    本文由 伯乐在线 - zerob13 翻译自 fromdev.欢迎加入Android小组.转载请参见文章末尾处的要求. Android 已经成为了世界上最受欢迎的操作系统之一.成千上万的智能手机和平板 ...

  3. (转载)Stackoverflow评选的C++推荐书单

    C++必读书籍推荐 (原链接:http://bestcbooks.com/recommended-cpp-books 2013-10-07) 本文内容来自国外著名编程问答网站Stackoverflow ...

  4. 书评第001篇:《C++黑客编程揭秘与防范》

    本书基本信息 作者:冀云(编著) 出版社:人民邮电出版社 出版时间:2012-6-1 ISBN:9787115280640 版次:1 页数:265 字数:406000 印刷时间:2012-6-1 开本 ...

  5. 推荐书单(转自GITHUB)

    Skip to content PersonalOpen sourceBusinessExplore Sign upSign in PricingBlogSupport   This reposito ...

  6. Web前端--黑客技术揭秘(菜鸟知识)

    一,Web安全的关键点 1.同源策略是众多安全策略的一个,是Web层面上的策略.很重要. 2.同源策略规定:不同域的client脚本在没明白授权的情况下.不能读写对方的资源. 3.同域要求两个网站同协 ...

  7. C语言之反汇编揭秘

    title: 'C语言之反汇编揭秘' tags: 汇编与反汇编 categories: 汇编与反汇编 copyright: true abbrlink: 'b1c9' date: 2019-09-07 ...

  8. 推荐书单(网课)-人生/编程/Python/机器学习-130本

    目录 总计(130本) 一.在读 二.将读 三.已读 非专业书单(77本) 四.已读 专业书单(53本) 五.已看网课(8个) 六.在看网课 一个人如果抱着义务的意识去读书,便不了解读书的艺术.--林 ...

  9. [在读]web前端黑客技术揭秘

随机推荐

  1. 批量处理sql 数据存入xml类型列

    个人记录 需求:当表T1 ItemCode和表T2 ItemName的数据相等时,将表T2所对应的ID和ItemName列的数据分别存入表T1 CAOZUO字段的id元素和text元素的文本中. 下面 ...

  2. 深入学习jQuery选择器系列第一篇——基础选择器和层级选择器

    × 目录 [1]id选择器 [2]元素选择器 [3]类选择器[4]通配选择器[5]群组选择器[6]后代选择器[7]兄弟选择器 前面的话 选择器是jQuery的根基,在jQuery中,对事件处理.遍历D ...

  3. Atitit.数据检索与网络爬虫与数据采集的原理概论

    Atitit.数据检索与网络爬虫与数据采集的原理概论 1. 信息检索1 1.1. <信息检索导论>((美)曼宁...)[简介_书评_在线阅读] - dangdang.html1 1.2. ...

  4. swift学习笔记2——函数、闭包

    之前学习swift时的个人笔记,根据github:the-swift-programming-language-in-chinese学习.总结,将重要的内容提取,加以理解后整理为学习笔记,方便以后查询 ...

  5. javaScript基础语法(上)

    相关理论概念: 直接量的概念:直接描述某个(些)存储空间的值的量,如变量的值.对象的值.数组的值. 数据类型:在数据结构中的定义是一个值的集合以及定义在这个值集上的一组操作. 1.变量的声明和使用 变 ...

  6. SQL Server会话KILL不掉,一直处于KILLED /ROLLBACK状态情形浅析

    今天遇到一个很奇怪的情况,发现一个会话异常,这个会话只是在执行一个简单的存储过程,里面使用了链接服务器(Linked Server)查询另外一台服务器数据(存储过程里面没有任何显性事务.UPDATE. ...

  7. Oracle索引重建

    一.前言 Oracle建议对于索引深度超过4级以及已删除的索引条目至少占有现有索引条目总数的20% 这2种情形下需要重建索引.有人持不同观点,就是强烈建议不要定期重建索引.索引重建是一个争论不休被不断 ...

  8. XSS 防御方法总结

    1. XSS攻击原理 XSS原称为CSS(Cross-Site Scripting),因为和层叠样式表(Cascading Style Sheets)重名,所以改称为XSS(X一般有未知的含义,还有扩 ...

  9. zip命令的基本用法

    zip命令的基本用法是: zip [参数] [打包后的文件名] [打包的目录路径] linux zip命令参数列表: -a 将文件转成ASCII模式 -F 尝试修复损坏的压缩文件 -h 显示帮助界面  ...

  10. ArrayList<E>源码分析

    ArrayList是按照线性表结构实现的 ArrayList的主要继承结构 public class ArrayList<E> extends AbstractList<E> ...