Covert Java (E-BOOK) (Record no. 191492)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01461 a2200205 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20170207154017.0 |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2003116632 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0672326388 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (DLC) 2003116632 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | Nust |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.133 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Kalinovsky, Alex, |
| 245 10 - TITLE STATEMENT | |
| Title | Covert Java (E-BOOK) |
| Remainder of title | techniques for decompiling, patching, and reverse engineering / |
| Statement of responsibility, etc. | Alex Kalinovsky. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Indianapolis, Ind. : |
| Name of publisher, distributor, etc. | Sams, |
| Date of publication, distribution, etc. | c2004. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | x, 268 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Introduction (Page-1) Getting Started (Page-5) Decompiling Classes (Page-13) Obfuscating Classes (Page-27) Hacking Non-Public Methods and Variables of a Class (Page-43) Replacing and Patching Application Classes (Page-51) Using Effective Tracing (Page-63) Manipulating Java Security (Page-69) Snooping the Runtime Environment (Page-75) Cracking Code with Unorthodox Debuggers (Page-81) Using Profilers for Application Runtime Analysis (Page-89) Load-Testing to Find and Fix Scalability Problems (Page-105) Reverse Engineering Applications (Page-121) Eavesdropping Techniques (Page-127) Controlling Class Loading (Page-139) Replacing and Patching Core Java Classes (Page-149) Intercepting Control Flow (Page-155) Understanding and Tweaking Bytecode (Page-165) Total Control with Native Code Patching (Page-185) Protecting Commercial Applications from Hacking (Page-201) |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Java (Computer program language) |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | Covert Java (E-BOOK) |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | 12/12/2016 | 05.133 KAL | MCSEB-107 | 12/08/2016 | 12/12/2016 | Book |
