eBooks-it.org Logo
eBooks-IT.org Inner Image

Covert Java

Techniques for Decompiling, Patching, and Reverse Engineering

Covert Java Image

Book Details:

Publisher:Sams
Series: Sams
Author:Alex Kalinovsky
Edition:1
ISBN-10:0672326388
ISBN-13:9780672326387
Pages:288
Published:May 13 2004
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:3.96 MB

Book Description:

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!

Download Link:

Related Books:

Hiding in Plain Sight

Steganography and the Art of Covert Communication
Hiding in Plain Sight Image
Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guysFirst book to describe international terrorists' cybersecurity tool of choice in an accessible languageAuthor is a top security consultant for the CIA and provides gripping stories that show how steganography worksAppendix provides tools to help people detect and counteract stenanography...

Hacking a Terror Network

The Silent Threat of Covert Channels
Hacking a Terror Network Image
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists us...

Java, Java, Java

Object-Oriented Problem Solving
Java, Java, Java Image
3rd Edition
Functional and flexible, this guide takes an objects-first approach to Java programming and problem using games and puzzles. Updated to cover Java version 1.5 features, such as generic types, enumerated types, and the Scanner class. Offers independent introductions to both a command-line interface and a graphical user interface (GUI). Features coverage of Unified Modeling Language (UML), the industry-standard, object-oriented design tool. Illustrates key aspects of Java with a collection of game and puzzle examples. Instructor and Student resources available online. For introductory computer programming students or professionals interested in learning...



2007 - 2021 © eBooks-IT.org