Covert Java (E-BOOK) techniques for decompiling, patching, and reverse engineering / Alex Kalinovsky.

By: Kalinovsky, AlexPublisher: Indianapolis, Ind. : Sams, c2004Description: x, 268 p. : ill. ; 24 cmISBN: 0672326388 (pbk.)Subject(s): Java (Computer program language) | Covert Java (E-BOOK)DDC classification: 005.133
Contents:
Introduction (Page-1) Getting Started (Page-5) Decompiling Classes (Page-13) Obfuscating Classes (Page-27) Hacking Non-Public Methods and Variables of a Class (Page-43) Replacing and Patching Application Classes (Page-51) Using Effective Tracing (Page-63) Manipulating Java Security (Page-69) Snooping the Runtime Environment (Page-75) Cracking Code with Unorthodox Debuggers (Page-81) Using Profilers for Application Runtime Analysis (Page-89) Load-Testing to Find and Fix Scalability Problems (Page-105) Reverse Engineering Applications (Page-121) Eavesdropping Techniques (Page-127) Controlling Class Loading (Page-139) Replacing and Patching Core Java Classes (Page-149) Intercepting Control Flow (Page-155) Understanding and Tweaking Bytecode (Page-165) Total Control with Native Code Patching (Page-185) Protecting Commercial Applications from Hacking (Page-201)
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 05.133 KAL (Browse shelf) Link to resource Available MCSEB-107
Total holds: 0

Introduction (Page-1) Getting Started (Page-5) Decompiling Classes (Page-13) Obfuscating Classes (Page-27) Hacking Non-Public Methods and Variables of a Class (Page-43) Replacing and Patching Application Classes (Page-51) Using Effective Tracing (Page-63) Manipulating Java Security (Page-69) Snooping the Runtime Environment (Page-75) Cracking Code with Unorthodox Debuggers (Page-81) Using Profilers for Application Runtime Analysis (Page-89) Load-Testing to Find and Fix Scalability Problems (Page-105) Reverse Engineering Applications (Page-121) Eavesdropping Techniques (Page-127) Controlling Class Loading (Page-139) Replacing and Patching Core Java Classes (Page-149) Intercepting Control Flow (Page-155) Understanding and Tweaking Bytecode (Page-165) Total Control with Native Code Patching (Page-185) Protecting Commercial Applications from Hacking (Page-201)

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.