Welcome to UE Central Library

Keep Smiling

Covert Java : (Record no. 511)

MARC details
000 -LEADER
fixed length control field 01400cam a22002054a 4500
001 - CONTROL NUMBER
control field 1610
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200630123344.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 031216s2004 inua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9798129707085
040 ## - CATALOGING SOURCE
Transcribing agency PK
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.13/3
Edition number 22
Item number A374
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kalinovsky, Alex,
245 10 - TITLE STATEMENT
Title Covert Java :
Remainder of title techniques for decompiling, patching, and reverse engineering /
Statement of responsibility, etc Alex Kalinovsky.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, Ind. :
Name of publisher, distributor, etc Sams,
Date of publication, distribution, etc c2004.
300 ## - PHYSICAL DESCRIPTION
Extent x, 268 p.
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes bibliographical references and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Java (Computer program language)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Getting started ;<br/>2. Decompiling classes ;<br/>3. Obfuscating classes ;<br/>4. Hacking non-public methods and variables of a class ;<br/>5. Replacing and patching application classes ;<br/>6. Using effective tracing ;<br/>7. Manipulating Java security ;<br/>8. Snooping the runtime environment ;<br/>9. Cracking code with unorthodox debuggers ;<br/>10. Using profilers for applications runtime analysis ;<br/>11. Load-testing to find and fix scalability problems ;<br/>12. Reverse engineering applications ;<br/>13. Eavesdropping techniques ;<br/>14. Controlling class loading ;<br/>15. Replacing and patching core Java classes ;<br/>16. Intercepting control flow ;<br/>17. Understanding and tweaking bytecode ;<br/>18. Total control with native code patching ;<br/>19. Protecting commercial applications from hacking.<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 07.06.2018 U.E. 005.133 A374 T1610 07.06.2018 07.06.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk