找回密码
 注册入学

QQ登录

只需一步,快速开始

Covert Java

2013-5-19 20:04| 发布者: admin| 查看: 550| 评论: 0|原作者: Alex Kalinovsky|来自: [db:来源]

ISBN:0-672-32638-8
出版时间:May, 2004
关键字:JAVA
总页数:283

A large portion of the book is dedicated to techniques that are commonly considered to be hacking. Hacking is used rather freely in the media and oftentimes with negative connotation. Hackers are frequently portrayed as crazy geeks wanting to boost their self esteem, and for some cases this is certainly true. The methods presented here, however, are intended for professional software developers and each technique has a real-life application.
Java developers and architects stand the best chance of learning the most from this work. To truly appreciate the problems and solutions presented in this book, you should have completed at least a few significant Java applications and worked with third-party code. That is not to say that junior developers have nothing to gain from this work. To keep the book concise and focused on the main topics, little coverage is given to the subjects that are expected to be well-known or well-documented. For example, when talking about hacking non-public class members, the book does not explain the limitations imposed by each visibility modifier. Such information can be easily obtained from the Internet or books that cover these topics in detail. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering is about extreme techniques that punch through the commonly expected boundaries.


鲜花

握手

雷人

路过

鸡蛋

联系我们|Archiver|小黑屋|手机版|滚动|柠檬大学 ( 京ICP备13050917号-2 )

GMT+8, 2024-5-17 09:57 , Processed in 0.029045 second(s), 16 queries .

Powered by Discuz! X3.5 Licensed

© 2001-2023 Discuz! Team.

返回顶部