´ë·®±¸¸ÅȨ >
¿Ü±¹µµ¼­
>
´ëÇб³Àç/Àü¹®¼­Àû
>
ÀÚ¿¬°úÇÐ ÀϹÝ

Ghidra Software Reverse Engineering for Beginners : Analyze, identify, and avoid malicious code and potential threats in your networks and systems
Á¤°¡ 32,000¿ø
ÆǸŰ¡ 32,000¿ø (0% , 0¿ø)
I-Æ÷ÀÎÆ® 960P Àû¸³(3%)
ÆǸŻóÅ ÆǸÅÁß
ºÐ·ù ÀÚ¿¬°úÇÐ ÀϹÝ
ÀúÀÚ A. P. David , David, A. P.
ÃâÆÇ»ç/¹ßÇàÀÏ Packt Publishing / 2021.09.01
ÆäÀÌÁö ¼ö 303 page
ISBN 9781800207974
»óÇ°ÄÚµå 353793074
°¡¿ëÀç°í Àç°íºÎÁ·À¸·Î ÃâÆÇ»ç ¹ßÁÖ ¿¹Á¤ÀÔ´Ï´Ù.
 
ÁÖ¹®¼ö·® :
´ë·®±¸¸Å Àü¹® ÀÎÅÍÆÄÅ© ´ë·®ÁÖ¹® ½Ã½ºÅÛÀ» ÀÌ¿ëÇÏ½Ã¸é °ßÀû¿¡¼­ºÎÅÍ ÇàÁ¤¼­·ù±îÁö Æí¸®ÇÏ°Ô ¼­ºñ½º¸¦ ¹ÞÀ¸½Ç ¼ö ÀÖ½À´Ï´Ù.
µµ¼­¸¦ °ßÀûÇÔ¿¡ ´ãÀ¸½Ã°í ½Ç½Ã°£ °ßÀûÀ» ¹ÞÀ¸½Ã¸é ±â´Ù¸®½Ç ÇÊ¿ä¾øÀÌ ÇÒÀιÞÀ¸½Ç ¼ö ÀÖ´Â °¡°ÝÀ» È®ÀÎÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.
¸ÅÁÖ ¹ß¼ÛÇØ µå¸®´Â ÀÎÅÍÆÄÅ©ÀÇ ½Å°£¾È³» Á¤º¸¸¦ ¹Þ¾Æº¸½Ã¸é »óÇ°ÀÇ ¼±Á¤À» ´õ¿í Æí¸®ÇÏ°Ô ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

 ´ë·®±¸¸ÅȨ  > ¿Ü±¹µµ¼­  > ´ëÇб³Àç/Àü¹®¼­Àû  > ÀÚ¿¬°úÇÐ ÀϹÝ
 ´ë·®±¸¸ÅȨ  > ¿Ü±¹µµ¼­  > °æÁ¦°æ¿µ/Àι®»çȸ  > »çȸ/¹®È­
 ´ë·®±¸¸ÅȨ  > ¿Ü±¹µµ¼­  > ÄÄÇ»ÅÍ  > ÀÎÅͳÝ/À¥ °³¹ß
 ´ë·®±¸¸ÅȨ  > ¿Ü±¹µµ¼­  > ´ëÇб³Àç/Àü¹®¼­Àû  > Àι®°è¿­
 ´ë·®±¸¸ÅȨ  > ¿Ü±¹µµ¼­  > ´ëÇб³Àç/Àü¹®¼­Àû  > ±â¼ú°úÇÐ ÀϹÝ

 
¸ñÂ÷
Section 1: Introduction to Ghidra Section 2: Reverse Engineering Section 3: Extending Ghidra

ÀúÀÚ
A. P. David
David, A. P.

ÀÌ ÃâÆÇ»çÀÇ °ü·Ã»óÇ°
Software Architecture with C# 12 and .NET 8 | Baptista, Gabriel,Abbruzzese, Francesco | Packt Publishing
Refactoring in Java | Packt Publishing
Real-World Implementation of C# Design Patterns | Packt Publishing
MATLAB for Machine Learning | Packt Publishing
Mastering Apex Programming | Packt Publishing

ÀÌ »óÇ°°ú °ü·ÃÀÖ´Â ´Ù¸¥ »óÇ°
Ghidra¸¦ È°¿ëÇÑ ¸®¹ö½º ¿£Áö´Ï¾î¸µ ÀÔ¹® | ÀåÁö³ª,A. P. µ¥À̺ñµå | ¿¡ÀÌÄÜÃâÆÇ
 
µµ¼­¸¦ ±¸ÀÔÇϽŠ°í°´ ¿©·¯ºÐµéÀÇ ¼­ÆòÀÔ´Ï´Ù.
ÀÚÀ¯·Î¿î ÀÇ°ß ±³È¯ÀÌ °¡´ÉÇÕ´Ï´Ù¸¸, ¼­ÆòÀÇ ¼º°Ý¿¡ ¸ÂÁö ¾Ê´Â ±ÛÀº »èÁ¦µÉ ¼ö ÀÖ½À´Ï´Ù.

µî·ÏµÈ ¼­ÆòÁß ºÐ¾ß¿Í »ó°ü¾øÀÌ ¸ÅÁÖ ¸ñ¿äÀÏ 5ÆíÀÇ ¿ì¼öÀÛÀ» ¼±Á¤ÇÏ¿©, S-Money 3¸¸¿øÀ» Àû¸³Çص帳´Ï´Ù.
ÃÑ 0°³ÀÇ ¼­ÆòÀÌ ÀÖ½À´Ï´Ù.