covert java - techniques for decompiling, patching, and reverse engineering, 2004

283 1.1K 0
covert java - techniques for decompiling, patching, and reverse engineering, 2004

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... hacking non-public class members, the book does not explain the limitations imposed by each visibility modifier Such information can be easily obtained from the Internet or books that cover these topics in detail Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering is about extreme techniques that punch through the commonly expected boundaries 2 Covert Java: Techniques for Decompiling,. .. has written for various publications, including JavaWorld, Sun JavaSoft, Information Week, and the Washington Post He is a Certified Enterprise Java Architect consulting for leading companies that use Java and J2EE He is also a lead architect for WebCream, a revolutionary Java product that bridges Swing and HTML In his spare time, Alex enjoys traveling, reading, windsurfing, snowboarding, and bodybuilding... with the various techniques described throughout Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering to help you understand how these techniques work out in actual practice Each chapter ends with an “In Brief” section summarizing the main points of the chapter, as well as a quiz section to help you review the material Getting Started Techniques Overview—When and Why to Use Each... legality of your actions Special Features of the Text Several typographic conventions are used in Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering to make the text more readable Italic font is used for emphasis and to indicate new terms Monospace font is used for parts of code, filenames, and URLs Monospace italic font indicates placeholders in code syntax In addition, a few special... editor, a command line for running scripts, archive support, and a multitude of features that make common tasks easy FAR and Total Commander File and Archive Manager (FAR) and Total Commander are both advanced file managers for Windows that trace their roots back to the DOS days and Norton Commander Distributed as shareware, they can be used without time limitation until you are ready to register for a small... methods, and inner class declarations is different, and so is the formatting, but the logic is absolutely the same We have also lost the comments, but well-written Java code such as ours is self-evident, isn’t it? Our case produced good results because full debugging information is included by javac when the -g option is used If the source code was compiled without the debug information (the -g:none... L E 1 2 FAR Versus Total Commander FEATURE FAR TOTAL COMMANDER Create, copy, view, edit, and delete for files and folders Excellent Excellent Internal and external viewer/editor Excellent Good (no internal editor) Seamless browsing of archive contents (JAR, Zip, and so on) Excellent Excellent Extensive customization of features and UI Excellent Good Windows-like look and feel Poor Good Customizable... brother Andrew Kalinovsky and my second dad and mentor Sergei Boiko Thanks and I love you all Acknowledgments Throughout the long hours I have spent writing this book, many people have helped me to accomplish this project I would like to thank my closest friends LaWanda Tetteh and Gleb Tulukin for giving me support and encouragement when I needed it Special credit goes to Amie Koker for being patient and. .. garbage collection frequency to improve performance Browsing object allocation and references to find and fix memory leaks Investigating thread allocation and synchronization to find the locking and data race problems and to improve performance Investigating an application at runtime to gain a better understanding of its internal structure 11 Load testing to find and fix scalability problems Creating automated... in 1974 and moved to the United States in 1997 He has been in the IT industry for more than 10 years, with experience that ranges from writing C and C++ applications to developing enterprise Java solutions Since 1997, Alex has worked solely with Java and is proud to be one of its original evangelists He has taught more than 15 classes on Enterprise Java technologies and worked as a mentor for many . various techniques described throughout Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering to help you understand how these techniques. used in Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering to make the text more readable. Italic font is used for emphasis and to indicate

Ngày đăng: 20/03/2014, 15:39

Mục lục

  • cover.pdf

  • page_r1.pdf

  • page_r2.pdf

  • page_r3.pdf

  • page_r4.pdf

  • page_r5.pdf

  • page_r6.pdf

  • page_r7.pdf

  • page_r8.pdf

  • page_r9.pdf

  • page_r10.pdf

  • page_r11.pdf

  • page_r12.pdf

  • page_r13.pdf

  • page_r14.pdf

  • page_1.pdf

  • page_2.pdf

  • page_3.pdf

  • page_4.pdf

  • page_5.pdf

Tài liệu cùng người dùng

Tài liệu liên quan