Covert Java : (Record no. 511)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01400cam a22002054a 4500 |
001 - CONTROL NUMBER | |
control field | 1610 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200630123344.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 031216s2004 inua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9798129707085 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.13/3 |
Edition number | 22 |
Item number | A374 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kalinovsky, Alex, |
245 10 - TITLE STATEMENT | |
Title | Covert Java : |
Remainder of title | techniques for decompiling, patching, and reverse engineering / |
Statement of responsibility, etc | Alex Kalinovsky. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Indianapolis, Ind. : |
Name of publisher, distributor, etc | Sams, |
Date of publication, distribution, etc | c2004. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | x, 268 p. |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Includes bibliographical references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Java (Computer program language) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Getting started ;<br/>2. Decompiling classes ;<br/>3. Obfuscating classes ;<br/>4. Hacking non-public methods and variables of a class ;<br/>5. Replacing and patching application classes ;<br/>6. Using effective tracing ;<br/>7. Manipulating Java security ;<br/>8. Snooping the runtime environment ;<br/>9. Cracking code with unorthodox debuggers ;<br/>10. Using profilers for applications runtime analysis ;<br/>11. Load-testing to find and fix scalability problems ;<br/>12. Reverse engineering applications ;<br/>13. Eavesdropping techniques ;<br/>14. Controlling class loading ;<br/>15. Replacing and patching core Java classes ;<br/>16. Intercepting control flow ;<br/>17. Understanding and tweaking bytecode ;<br/>18. Total control with native code patching ;<br/>19. Protecting commercial applications from hacking.<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 07.06.2018 | U.E. | 005.133 A374 | T1610 | 07.06.2018 | 07.06.2018 | Books |