Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載


Binary Hacks ―ハッカー秘伝のテクニック100選

簡體網頁||繁體網頁

Binary Hacks ―ハッカー秘伝のテクニック100選 pdf epub mobi 著者簡介


Binary Hacks ―ハッカー秘伝のテクニック100選 pdf epub mobi 圖書描述

Binary Hacks from O'Reilly Japan is a book about low-level programming on GNU/Linux systems. The goal of the book is to offer useful but not necessarily very well-known techniques as many as we can to readers.

Table of Contents

Chapter 1. Introduction

1. Introduction to Binary Hacks

2. Terminology of Binary Hacks

3. Using "file" to tell file types

4. Using "od" to dump binary files

Chapter 2. Object Files Hacks

5. Introduction to ELF

6. Static libraries and dynamic libraries

7. Using "ldd" to check dependencies of shared libraries

8. Using "readelf" to see information of ELF files

9. Using "objdump" to dump object files

10. Using "objdump" to disassemble object files

11. Using "objcopy" to embed data in executables

12. Using "nm" to see lists of symbols in object files

13. Using "strings" to extract strings from binary files

14. Using "c++filt" to demangle C++ symbols

15. Using "addr2line" to get file names and line numbers by addresses

16. Using "strip" to delete symbols from object files

17. Using "ar" to modify static libraries

18. How to link C and C++ programs

19. How to avoid symbol collision issues

20. Why PIC code is used for shared libraries on GNU/Linux systems

21. Using "statifier" to create pseudo static executables from dynamic executables

Chapter 3. GNU Programming Hacks

22. Introduction to GCC extensions

23. Using inline assembler with GCC

24. Using GCC's builtin functions for optimization

25. Writing "Hello World" without using glibc

26. Using TLS (Thread Local Storage)

27. Switching glibc's internal libraries by system capabilities

28. Changing behavior of programs by linked libraries

29. Reducing exported symbols of libraries

30. Using versioned symbols to manage compatibility

31. Calling functions before main()

32. How GCC generates trampoline code at runtime

33. Allowing and disallowing executable flags of code on stacks

34. Running code on heaps

35. Creating PIE (Position Independent Executable)

36. Writing synchronized methods in C++

37. Creating singletons in C++

38. Understanding g++'s exceptions (throw)

39. Understanding g++'s exceptions (SjLj)

40. Understanding g++'s exceptions (DWARF2)

41. Understanding runtime cost of g++'s exceptions

Chapter 4. Secure Programming Hacks

42. Introduction to GCC secure programming

43. Using "-ftrapv" to detect integer overflows

44. Using "Mudflap" to detect buffer overflows

45. Using "-D_FORTIFY_SOURCE" to detect buffer overflows

46. Using "-fstack-protector" to protect stacks

47. Why you should use unsigned constants to do bitmask

48. Why big shift operations are dangerous

49. Why you should care difference between 0 and NULL on 64-bit systems

50. Thread-safe functions defined by POSIX

51. Writing signal handlers in a safe manner

52. Using "sigwait" to process async signals synchronously

53. Using "sigsafe" to write signal processing safely

54. Using "Valgrind" to detect memory leaks

55. Using "Valgrind" to detect invalid memory access

56. Using "Helgrind" to debug multi-threaded programs

57. Using "fakeroot" to run programs with fake root privilege

Chapter 5. Runtime Hacks

58. How programs reach main()

59. How system calls are called

60. Using "LD_PRELOAD" to switch shared libraries

61. Using "LD_PRELOAD" to wrap existing functions

62. Using "dlopen" to do dynamic linking

63. Showing backtraces with C programs

64. Checking running process's absolute path

65. Checking loaded shared libraries of running programs

66. Checking memory maps of running programs

67. Using "libbfd" to list symbols

68. Demangling C++ symbols at runtime

69. Using "ffcall" to call functions with dynamic signatures

70. Using "libdwarf" to get debug information

71. Using "dumper" to pretty-print struct variables

72. How to load object files yourself

73. Using "libunwind" to control call chains

74. Using "GNU lightning" to generate code in a portable manner

75. Getting addresses of stacks

76. Using "sigaltstack" to handle stack overflows

77. Hooking entering and exiting of functions

78. Modifying contexts of programs in signal handlers

79. Getting values of program counters

80. Rewriting your programs at runtime

81. Using "SIGSEGV" to validate accessibility of addresses

82. Using "strace" to trace system calls

83. Using "ltrace" to trace function calls in shared libraries

84. Using "Jockey" to record and replay programs

85. Using "prelink" to improve programs starting up time

86. Using 'livepatch" to patch running programs

Chapter 6. Profilers and Debuggers Hacks

87. Using "gprof" to profile programs

88. Using "sysprof" to profile systems very easily

89. Using "oprofile" to profile systems

90. Using "GDB" to control running programs

91. Using debugging support of hardware

92. Setting break points in your C programs

Chapter 7. Misc Hacks

93. How Boehm GC works

94. Why you should be careful about memory ordering of processors

95. Light-weight concurrent processing with PCL (Portable Coroutine Library)

96. Counting clock counts of CPUs

97. How floating numbers are expressed in bits

98. What's special about x86's floating numbers instructions

99. Raising signals for operations resulting infinite or NAN.

100. Further reading

Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載

Binary Hacks ―ハッカー秘伝のテクニック100選 pdf epub mobi 圖書目錄




點擊這裡下載
    


想要找書就要到 本本書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

發表於2024-11-22

Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載

Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載

Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載



喜欢 Binary Hacks ―ハッカー秘伝のテクニック100選 電子書 的读者还喜欢


Binary Hacks ―ハッカー秘伝のテクニック100選 pdf epub mobi 讀後感

評分

本書在美國 amazon上的網頁: http://www.amazon.com/BINARY-HACKS-Tips-hackers-election/dp/7508387937/ 看到瞭嗎? Author 是:GAO LIN ZHE ( DENG ) JIANG BIN YANG CHAO YI 太詭異瞭!狗屎翻譯跟病毒一樣,還具有傳染性!

評分

我不會日語,所以把原書給我我也看不懂。這裏隻說中文版。今天剛拿到書,看第二章,ELF的規範我看過不止一遍,即使這樣我也不知道第二章的前10頁在說什麼,或者說我很難把這些漢字和我看過的東西聯係在一起,即便是我在大腦中進行"中文<--->英文"的轉換之後。 這本書的中文用...  

評分

評分

《Binary Hacks:黑客秘笈100選》的主題是關於底層程序的技術。說到底層,就是和“原始的”計算機很接近的意思。軟件的世界是一個抽象化的積纍,逐步演化到現在的階段。抽象化就是隱藏底層的復雜部分,相比較來說是可以提高生産性、安全性的方法,並給開發者提供程序化的手段。...  

評分

《Binary Hacks》 作者:Satoru Takabayashi 齣版社:O'Reilly Japan  

類似圖書 點擊查看全場最低價
出版者:オライリー・ジャパン
作者:高林 哲
出品人:
頁數:412
譯者:
出版時間:2006-11-14
價格:JPY 33.60
裝幀:単行本(ソフトカバー)
isbn號碼:9784873112886
叢書系列:

圖書標籤: linux  hack  Programming  計算機科學  計算機  binary  unix  日文書   


Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載
想要找書就要到 本本書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

Binary Hacks ―ハッカー秘伝のテクニック100選 pdf epub mobi 用戶評價

評分

把目前能看懂的hacks讀完瞭。原書很不錯,中文版則充分演繹瞭什麼叫做狗屎一樣的翻譯。

評分

又一本被翻譯糟蹋瞭的書。。。

評分

又一本被翻譯糟蹋瞭的書。。。

評分

評分

把目前能看懂的hacks讀完瞭。原書很不錯,中文版則充分演繹瞭什麼叫做狗屎一樣的翻譯。

Binary Hacks ―ハッカー秘伝のテクニック100選 2024 pdf epub mobi 電子書 下載


分享鏈接





相關圖書




本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

友情鏈接

© 2024 onlinetoolsland.com All Rights Reserved. 本本書屋 版權所有