01436 a2200193 4500003000500000005001700005010001700022020002200039035002200061040000900083082001200092100002200104245010800126260004000234300003200274505087400306650003701180651002501217Nust20170207154017.0 a 2003116632 a0672326388 (pbk.) a(DLC) 2003116632 cNust00a005.1331 aKalinovsky, Alex,10aCovert Java (E-BOOK)btechniques for decompiling, patching, and reverse engineering /cAlex Kalinovsky. aIndianapolis, Ind. :bSams,cc2004. ax, 268 p. :bill. ;c24 cm. aIntroduction (Page-1) Getting Started (Page-5) Decompiling Classes (Page-13) Obfuscating Classes (Page-27) Hacking Non-Public Methods and Variables of a Class (Page-43) Replacing and Patching Application Classes (Page-51) Using Effective Tracing (Page-63) Manipulating Java Security (Page-69) Snooping the Runtime Environment (Page-75) Cracking Code with Unorthodox Debuggers (Page-81) Using Profilers for Application Runtime Analysis (Page-89) Load-Testing to Find and Fix Scalability Problems (Page-105) Reverse Engineering Applications (Page-121) Eavesdropping Techniques (Page-127) Controlling Class Loading (Page-139) Replacing and Patching Core Java Classes (Page-149) Intercepting Control Flow (Page-155) Understanding and Tweaking Bytecode (Page-165) Total Control with Native Code Patching (Page-185) Protecting Commercial Applications from Hacking (Page-201) 0aJava (Computer program language) aCovert Java (E-BOOK)