Covert Java :techniques for decompiling, patching, and reverse engineering -(E-BOOK) Alex Kalinovsky. 005.133

By: Kalinovsky, AlexPublisher: Indianapolis, Ind. : Sams, c2004Description: x, 268 p. : ill. ; 24 cmISBN: 0672326388 (pbk.)Subject(s): Java (Computer program language) | E-BOOKDDC classification: 005.133
Contents:
Introduction (Page-1), 1 Getting Started(Page-5), 2 Decompiling Classes(Page-13), 3 Obfuscating Classes (Page-27), 4 Hacking Non-Public Methods and Variables of a Class(Page-43), 5 Replacing and Patching Application Classes (Page-51), 6 Using Effective Tracing (Page-63), 7 Manipulating Java Security (Page-69), 8 Snooping the Runtime Environment(Page-75), 9 Cracking Code with Unorthodox Debuggers (Page-81), 10 Using Profilers for Application Runtime Analysis(Page-89), 11 Load-Testing to Find and Fix Scalability Problems(Page-105), 12 Reverse Engineering Applications (Page-121), 13 Eavesdropping Techniques (Page-127), 14 Controlling Class Loading(Page-139), 15 Replacing and Patching Core Java Classes (Page-149), 16 Intercepting Control Flow(Page-155), 17 Understanding and Tweaking Bytecode (Page-165), 18 Total Control with Native Code Patching (Page-185), 19 Protecting Commercial Applications from Hacking(Page-201). 2ND EDITION
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 005.133 KAL (Browse shelf) Link to resource Available MCSEB-1272
Total holds: 0

Introduction (Page-1), 1 Getting Started(Page-5), 2 Decompiling Classes(Page-13), 3 Obfuscating Classes (Page-27), 4 Hacking Non-Public Methods and Variables of a Class(Page-43), 5 Replacing and Patching Application Classes (Page-51), 6 Using Effective Tracing (Page-63), 7 Manipulating Java Security (Page-69), 8 Snooping the Runtime Environment(Page-75), 9 Cracking Code with Unorthodox Debuggers (Page-81), 10 Using Profilers for Application Runtime Analysis(Page-89), 11 Load-Testing to Find and Fix Scalability Problems(Page-105), 12 Reverse Engineering Applications (Page-121), 13 Eavesdropping Techniques (Page-127), 14 Controlling Class Loading(Page-139), 15 Replacing and Patching Core Java Classes (Page-149), 16 Intercepting Control Flow(Page-155), 17 Understanding and Tweaking Bytecode (Page-165), 18 Total Control with Native Code Patching (Page-185), 19 Protecting Commercial Applications from Hacking(Page-201). 2ND EDITION

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.