Ghidra software reverse engineering for beginners : Analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David
Material type:
- 9781800207974
- QA 76.758 .D38 2020

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC QA 76.758 .D38 2020 (Browse shelf(Opens below)) | c.1 | Available | NULIB000019586 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.585 .F37 2022 Modern software engineering : doing what works to build better software faster / | GC QA 76.585 .K43 2021 Digital transformation using emerging technologies : a CxO's guide to transform your organization / | GC QA 76.585 .K57 2020 Cloud computing / | GC QA 76.758 .D38 2020 Ghidra software reverse engineering for beginners : Analyze, identify, and avoid malicious code and potential threats in your networks and systems / | GC QA 76.758 .F74 2021 Head first design patterns : Building extensible and maintainable object-oriented software / | GC QA 76.758 .L68 2021 Software engineering for absolute beginners : your guide to creating software products / | GC QA 76.758 .R53 2020 Fundamentals of software architecture : an engineering approach / |
Includes bibliographical references.
Section 1: Introduction to Ghidra -- Chapter 1: Getting Started with Ghidra -- Chapter 2: Automating RE Tasks with Ghidra -- Chapter 3: Ghidra Debug Mode -- Chapter 4: Using Ghidra Extensions -- Section 2: Reverse Engineering -- Chapter 5: Reversing Malware Using Ghidra -- Chapter 6: Scripting Malware Analysis -- Chapter 7: Using Ghidra Headless Analyzer.
Ghidra is the NSA's state-of-the-art reverse engineering framework. It is open source, allowing the community to extend it with impressive range of features. This book offers a comprehensive introduction to anyone new to the Ghidra reverse engineering framework and malware reverse engineering.
There are no comments on this title.