Welcome to UE Central Library

Keep Smiling

Covert Java : techniques for decompiling, patching, and reverse engineering / Alex Kalinovsky.

By: Material type: TextTextPublication details: Indianapolis, Ind. : Sams, c2004.Description: x, 268 p. ill. ; 24 cmISBN:
  • 9798129707085
Subject(s): DDC classification:
  • 005.13/3 22 A374
Contents:
1. Getting started ; 2. Decompiling classes ; 3. Obfuscating classes ; 4. Hacking non-public methods and variables of a class ; 5. Replacing and patching application classes ; 6. Using effective tracing ; 7. Manipulating Java security ; 8. Snooping the runtime environment ; 9. Cracking code with unorthodox debuggers ; 10. Using profilers for applications runtime analysis ; 11. Load-testing to find and fix scalability problems ; 12. Reverse engineering applications ; 13. Eavesdropping techniques ; 14. Controlling class loading ; 15. Replacing and patching core Java classes ; 16. Intercepting control flow ; 17. Understanding and tweaking bytecode ; 18. Total control with native code patching ; 19. Protecting commercial applications from hacking.
List(s) this item appears in: Computer
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books UE-Central Library 005.133 A374 (Browse shelf(Opens below)) Available T1610

Includes bibliographical references and index.

1. Getting started ;
2. Decompiling classes ;
3. Obfuscating classes ;
4. Hacking non-public methods and variables of a class ;
5. Replacing and patching application classes ;
6. Using effective tracing ;
7. Manipulating Java security ;
8. Snooping the runtime environment ;
9. Cracking code with unorthodox debuggers ;
10. Using profilers for applications runtime analysis ;
11. Load-testing to find and fix scalability problems ;
12. Reverse engineering applications ;
13. Eavesdropping techniques ;
14. Controlling class loading ;
15. Replacing and patching core Java classes ;
16. Intercepting control flow ;
17. Understanding and tweaking bytecode ;
18. Total control with native code patching ;
19. Protecting commercial applications from hacking.

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk