| 000 | 01461 a2200205 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207154017.0 | ||
| 010 | _a 2003116632 | ||
| 020 | _a0672326388 (pbk.) | ||
| 035 | _a(DLC) 2003116632 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.133 |
| 100 | 1 | _aKalinovsky, Alex, | |
| 245 | 1 | 0 |
_aCovert Java (E-BOOK) _btechniques for decompiling, patching, and reverse engineering / _cAlex Kalinovsky. |
| 260 |
_aIndianapolis, Ind. : _bSams, _cc2004. |
||
| 300 |
_ax, 268 p. : _bill. ; _c24 cm. |
||
| 505 | _aIntroduction (Page-1) Getting Started (Page-5) Decompiling Classes (Page-13) Obfuscating Classes (Page-27) Hacking Non-Public Methods and Variables of a Class (Page-43) Replacing and Patching Application Classes (Page-51) Using Effective Tracing (Page-63) Manipulating Java Security (Page-69) Snooping the Runtime Environment (Page-75) Cracking Code with Unorthodox Debuggers (Page-81) Using Profilers for Application Runtime Analysis (Page-89) Load-Testing to Find and Fix Scalability Problems (Page-105) Reverse Engineering Applications (Page-121) Eavesdropping Techniques (Page-127) Controlling Class Loading (Page-139) Replacing and Patching Core Java Classes (Page-149) Intercepting Control Flow (Page-155) Understanding and Tweaking Bytecode (Page-165) Total Control with Native Code Patching (Page-185) Protecting Commercial Applications from Hacking (Page-201) | ||
| 650 | 0 | _aJava (Computer program language) | |
| 651 | _aCovert Java (E-BOOK) | ||
| 942 |
_2ddc _cBK |
||
| 999 |
_c191492 _d191492 |
||