<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01461    a2200205   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207154017.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2003116632</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0672326388 (pbk.)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(DLC)  2003116632</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.133</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Kalinovsky, Alex,</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Covert Java (E-BOOK)</subfield>
    <subfield code="b">techniques for decompiling, patching, and reverse engineering /</subfield>
    <subfield code="c">Alex Kalinovsky.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Indianapolis, Ind. :</subfield>
    <subfield code="b">Sams,</subfield>
    <subfield code="c">c2004.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">x, 268 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Introduction (Page-1) Getting Started (Page-5) Decompiling Classes (Page-13) Obfuscating Classes (Page-27) Hacking Non-Public Methods and Variables of a Class (Page-43) Replacing and Patching Application Classes (Page-51) Using Effective Tracing (Page-63) Manipulating Java Security (Page-69) Snooping the Runtime Environment (Page-75) Cracking Code with Unorthodox Debuggers (Page-81) Using Profilers for Application Runtime Analysis (Page-89)  Load-Testing to Find and Fix Scalability Problems (Page-105) Reverse Engineering Applications (Page-121) Eavesdropping Techniques (Page-127) Controlling Class Loading (Page-139) Replacing and Patching Core Java Classes (Page-149) Intercepting Control Flow (Page-155) Understanding and Tweaking Bytecode (Page-165) Total Control with Native Code Patching (Page-185) Protecting Commercial Applications from Hacking (Page-201)</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Java (Computer program language)</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">Covert Java (E-BOOK)</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">191492</subfield>
    <subfield code="d">191492</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">05.133   KAL</subfield>
    <subfield code="p">MCSEB-107</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
