找回密码
 立即注册
encryptiontechnologyand加密解密 | 企业管理 2022-09-18 90 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
内容简介本书介绍软件的加密与解密技术,在详细叙说加密解密技术的一起,还介绍了相应的实现原理,以使读者可以对加密解密技术有更深入的理解,然后更好地提升自己的编程水平。全书共分为10章,包括反汇编调试的静态与动态分析、暴力破解共享软件、补丁技术及其工具、加壳/脱壳技术和反编译语言程序等内容。本书内容丰富,图文并茂,叙说深入浅出,适用于对加密解密技术有爱好的读者;一起可作为加密解密课程教材或参考书,也适用于软件开发从业人员及编程爱好者参考。目录第1章加密VS解密——大磕碰1.1认识加密技术1.1.1数据加密的基本概念1.1.2加密技术及其相关问题1.2加密VS解密:矛与盾的联系1.3常见软件加密维护技术1.3.1常见软件加密维护技术1.3.2加密解密的相关概念1.3.3用于注册码1.4理解汇编语言的几条常用命令第2章代码分析技术及代码命令2.1为何要学习代码分析技术2.1.1初识PE格式文件2.1.2文件偏移地址与虚拟地址转换2.1.3如何寻觅程序的进口点(OEP)本资料共包括以下附件:
[深入分析加密解密].pdf
.....

(Introduction This book introduces the encryption and decryption technology of software. Along with the detailed description of the encryption and decryption technology, it also introduces the corresponding implementation principles, so that readers can have a deeper understanding of the encryption and decryption technology, and then better improve their own programming level. The book is divided into 10 chapters, including static and dynamic analysis of disassembly and debugging, brute force cracking of shareware, patch technology and its tools, packing/unpacking technology and decompiled language programs. This book is rich in content, pictures and texts, narration in simple language, suitable for readers who are interested in encryption and decryption technology; it can be used as a textbook or reference book for encryption and decryption courses, and is also suitable for software development practitioners and programming enthusiasts. Contents Chapter 1 Encryption VS Decryption - Big Bump 1.1 Understanding Encryption Technology 1.1.1 Basic Concepts of Data Encryption 1.1.2 Encryption Technology and Related Issues 1.2 Encryption VS Decryption: The Connection Between Spear and Shield 1.3 Common Software Encryption Maintenance Techniques 1.3. 1 Common software encryption and maintenance techniques 1.3.2 Related concepts of encryption and decryption 1.3.3 Used for registration code 1.4 Several common commands for understanding assembly language Chapter 2 Code analysis technology and code commands 2.1 Why should learn code analysis technology 2.1.1 Beginning Identifying PE format files 2.1.2 File offset address and virtual address translation 2.1.3 How to find program entry point (OEP) This document includes the following attachments:
[In-depth analysis of encryption and decryption].pdf
.....)

[下载]15450782964.rar




上一篇:第5课QUICKIP进行多点远程控制
下一篇:juniper防火墙初级配置