O'Reilly logo

Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering by Alex Kalinovsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Getting Started

Techniques Overview—When and Why to Use Each Method

Table 1.1 presents a brief overview of techniques that are discussed in more detail in the corresponding chapters. Use this as a road map to getting started with this book.

Table 1.1. Techniques Overview

CHAPTER

TECHNIQUE

USEFUL FOR

2

Decompiling classes

Recovering lost source code

Learning the implementation of a feature or trick

Troubleshooting undocmented code

Fixing urgent bugs in production or third-party code

Evaluating how your code might be hacked

3

Obfuscating classes

Protecting bytecode ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required