Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Disassembling
Table 1.1: Signed single-byte numbers
Table 1.2: Data exchange commands
Table 1.3: Input/output commands
Table 1.4: Instructions for operations over the stack
Table 1.5: Instructions for integer arithmetic
Table 1.6: Logical operations
Table 1.7: Shift operations
Table 1.8: String operations
Table 1.9: Commands for operations over flags
Table 1.10: Control flow commands
Table 1.11: Commands for supporting high-level programming languages
Table 1.12: Interrupt commands
Table 1.13: Processor synchronization commands
Table 1.14: Commands for processing chains of bits (introduced in the Intel 386 processor)
Table 1.15: Protection control commands
Table 1.16: Commands for exchanging data with control registers
Table 1.17: Commands for identifying and controlling architecture
Table 1.18: Caching control commands
Table 1.19: Data exchange commands
Table 1.20: Data comparison commands
Table 1.21: Arithmetic commands
Table 1.22: Transcendental functions
Table 1.23: Coprocessor control commands
Table 1.24: MMX extension commands
Table 1.25: New MMX commands
Table 1.26: Conditional jumps codes
Table 1.27: MOD RIM byte structure in 32-bit addressing
Table 1.28: Structure of the SIB byte
Table 1.29: Flags that characterize a section
Chapter 3: Main Paradigms of the Executable Code Analysis
Table 3.1: Optimal requirements for alignment of data of different sizes
Table 3.2: Standard calling conventions used by contemporary compilers
Table 3.3: Flag values for different situations of comparison
Previous page
Table of content
Next page
Disassembling Code: IDA Pro and SoftICE
ISBN: 1931769516
EAN: 2147483647
Year: 2006
Pages: 63
Authors:
Vlad Pirogov
BUY ON AMAZON
Java I/O
Counting the Available Bytes
An Efficient Stream Copier
Reading Resources from JAR Files
Socket Channels
Directories and Paths
Lotus Notes and Domino 6 Development (2nd Edition)
Creating Shared Files
Getting User Input
Writing View Formulas
What Is XML?
Domino URL Identifiers
The Java Tutorial: A Short Course on the Basics, 4th Edition
Code Samples
How Do These Concepts Translate into Code?
Using the Streams
User Interface Problems
Interfaces
GO! with Microsoft Office 2003 Brief (2nd Edition)
Project 2A. Alaska Trip
Objective 4. Create a Table
Objective 5. Use Financial Functions
Objective 1. Rename a Database
Concepts Assessments
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 9. Remote Control Linux with a Bluetooth Phone
Hack 51. Track Wireless Users
Hack 86. Pirouette Can Waveguide
Section A.1. 802.11: The Mother of All IEEE Wireless Ethernet
Section A.10. 802.1x: Port Security for Network Communications
Junos Cookbook (Cookbooks (OReilly))
Creating a Login Account for Remote Authentication
Setting the Date and Time on the Router Manually
Viewing Routes to a Particular Prefix
Mitigating Route Instabilities with Route Flap Damping
Setting Up a Simple Layer 3 VPN
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies