Book description
Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property.
For example, how secure is your code after you run an obfuscator? The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do.
Table of contents
- Cover
- Title
- Copyright
- Dedication
- Contents at a Glance
- Contents
- About the Author
- About the Technical Reviewer
- Acknowledgments
- Chapter 1: Introduction
- Chapter 2: Ghost in the Machine
- Chapter 3: Tools of the Trade
- Chapter 4: Protecting Your Source: Strategies for Defeating Decompilers
- Chapter 5: Decompiler Design
- Chapter 6: Decompiler Implementation
- Chapter 7: Case Studies
- Appendix A: Classfile Grammar
- Index
- Ad page
Product information
- Title: Decompiling Java
- Author(s):
- Release date: July 2004
- Publisher(s): Apress
- ISBN: 9781430207399
You might also like
book
Java Servlet Programming, 2nd Edition
Servlets are an exciting and important technology that ties Java to the Web, allowing programmers to …
book
Java Projects - Second Edition
Learn how to build scalable, resilient, and effective applications in Java that suit your software requirements. …
book
Java Enterprise in a Nutshell, Second Edition
Nothing is as constant as change, and this is as true in enterprise computing as anywhere …
book
Java 11 Cookbook
Solutions for modular, functional, reactive, GUI, network, and multithreaded programming Key Features Explore the latest features …