As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!
"Sinopsis" puede pertenecer a otra edición de este libro.
Buzz about Covert Java
"Covert Java" provides a fascinating and look at behind the scenes Java development tactics that are usually the domain of seasoned veterans. Definitely a read for those who want to master Java.
--Floyd Marinescu, Author, EJB Design Patterns; General Manager & founder of TheServerSide Communities.
Every now and then, a Java book comes along that you must add to your library. "Covert Java" is one of those books.
"Covert Java" explores the topic of hacking Java code -- to solve problems, not to create them. The author explores various hacking techniques, such as class decompilation, patching, and logic tracing; as well as tools (such as FAR and JODE) for simplifying the hacking experience. A variety of "Stories from the Trenches" provides real-life experiences where hacking techniques were needed to save projects from disaster. The end-of-chapter quizzes help you master the book's wealth of valuable and useful information.
This is a book for the good guys, so miscreants beware. The author has done a fantastic job exploring a delicate subject. For all Java developers, especially developers involved in J2EE and other intense Java projects, "Covert Java" is a must-have book. I heartily recommend it.
--Jeff Friesen, author and columnist, JavaWorld's "Java 101"
The first book on hacking software written specifically for the Java developer. 2500 years ago, the great general Sun Tzu said, "If you know the enemy and know yourself, you need not fear the result of a hundred battles." If you're a Java developer, this book is a giant step toward knowing your enemy.
--Kevin Bedell, Editor-in-Chief, LinuxWorld; co-author, "Struts Kick Start," "Programming Apache Axis"
"Covert Java" goes beyond the advanced topics, discussing those things that only hardcore programming gurus know (decompiling, security, bytecode hacking, etc). I wish I had read this book at the beginning of my carreer. It would have saved me countless hours of 'learning the hard way'.
I'm glad that someone finally has the courage to write such a book. "Covert Java" is full of controversial, nontrivial, and incredibly useful information. This book fills a void in the Java programming space that no other books can fill.
--Emmanuel Proulx, Web Developer; WebLogic 7 Certified Engineer
"Covert Java" is all about getting under the hood of Java applications; from manipulating the VM to eavesdropping on JDBC. A very practical guide, it gives you the techniques and tools to understand how Java works at the bytecode level and why this is important.
--Craig Pfeifer, Senior Technical Consultant, Impact Innovations Group
The authors did a great job describing useful techniques and tools to solve real application problems using intrusive techniques in java environment. A must read for anyone looking to solve real application problems or to understand a specific protocol implementation.
--Krishna V.S. Chaganti, Senior J2EE Architect and co-author, "J2EE Developer’s Handbook"
The author is revealing information that is unknown to the common Java programmer and it should scare them to death: the author describes how to decompile and hack classes, circumvent security and licensing mechanisms, and intercept seemingly "secure" communications. This information and the tools he describes have been around in hacking circles for years, but by bringing this information public, he teaches us to be better programmers, to write stronger and more secure software!
--Steven Haines, author and J2EE evangelist, Quest SoftwareAbout the Author:
Alex Kalinovsky was born in Ukraine in 1974 and moved to the United States in 1997. He has been in the IT industry for more than 10 years, with experience that ranges from writing C and C++ applications to developing enterprise Java solutions. Since 1997, Alex has worked solely with Java and is proud to be one of its original evangelists. He has taught more than 15 classes on Enterprise Java technologies and worked as a mentor for many teams. Alex has written for various publications, including JavaWorld, Sun JavaSoft, Information Week and the Washington Post. He is a Certified Enterprise Java Architect consulting for leading companies that use Java and J2EE. He is also a lead architect for WebCream, a revolutionary Java product that bridges Swing and HTML. In his spare time, Alex enjoys traveling, reading, wind-surfing, snowboarding and bodybuilding.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Sams, 2004. Paperback. Estado de conservación: New. book. Nº de ref. de la librería M0672326388
Descripción Sams, 2004. Paperback. Estado de conservación: New. Never used!. Nº de ref. de la librería P110672326388