Covert Java Techniques for Decompiling, Patching, and Reverse Engineering~tqw~ darksiderg

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -

Torrent info

Name:Covert Java Techniques for Decompiling, Patching, and Reverse Engineering~tqw~ darksiderg

Total Size: 3.85 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Full Movie @ Movie4u

Last Updated: 2017-01-02 11:51:28 (Update Now)

Torrent added: 2009-08-20 22:22:14

CyberGhost VPN For Torrents

Torrent Files List

tracked_by_h33t_com.txt (Size: 3.85 MB) (Files: 3)


0.02 KB

 Covert Java Techniques for Decompiling, Patching, and Reverse Engineering~tqw~_darksiderg.pdf

3.85 MB

 Covert Java - Techniques for Decompiling, Patching, and Reverse Engineering~tqw~_darksiderg.nfo

3.87 KB


leech seeds

Torrent description

Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

General Information
Type.................: Ebook
Part Size............: 4,036,624 bytes

Post Information
Posted by............: ~tqw~

Release Notes
This book has been disowned by Sams Publishing. You will not be able to find the
code for this book despite the fact that it is only 10 months old, as of January
2005. The book does not have its own website. Having said all that, I like the
book itself. There are some very useful techniques. Java, like every development
language has weaknesses, and if you write code professionally you NEED to know
what those weaknesses are, because the bad guys know. This book covers many of
those weaknesses, both for exploiting them and for protecting your software and
systems from these exploits. There are very valid reasons why this information
should be available to the entire public. Anyone who has had to deal with
malicious code knows this to be true. The only way to stop computer viruses, or
any physical disease for that matter, is education and shared information. This
book does that. I recently found a very clevor virus on my system that was being
used by an advertizer. With the information in this book I was able to reverse
engineer it and figure out how it was exploiting a weakness in the Java Virtual
Machine of Internet Explorer. Microsoft now has a patch for this security hole,
by the way. The book is written fairly well but it is geared towards the most
consise discussion of each topic and is targeted at intermediate to advanced
developers. However, there are some techniques that are useful to every
developer. I recently had a job interview and some of the questions I was asked
came right out of this book.

Table of Contents
Introduction 1
1 Getting started 5
2 Decompiling classes 13
3 Obfuscating classes 27
4 Hacking non-public methods and variables of a class 43
5 Replacing and patching application classes 51
6 Using effective tracing 63
7 Manipulating Java security 69
8 Snooping the runtime environment 75
9 Cracking code with unorthodox debuggers 81
10 Using profilers for applications runtime analysis 89
11 Load-testing to find and fix scalability problems 105
12 Reverse engineering applications 121
13 Eavesdropping techniques 127
14 Controlling class loading 139
15 Replacing and patching core Java classes 149
16 Intercepting control flow 155
17 Understanding and tweaking bytecode 165
18 Total control with native code patching 185
19 Protecting commercial applications from hacking 201
A: Commercial software license 227
B: Resources 233
C: Quiz answers 239
Index 249

Product Details

* ISBN: 0672326388
* ISBN-13: 9780672326387
* Format: Paperback, 268pp
* Publisher: Sams
* Pub. Date: May 2004

Install Notes
Adobe Acrobat Reader

related torrents

Torrent name

health leech seeds Size

comments (0)

Main Menu