Decompiling Java

Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilati...

Full description

Bibliographic Details
Main Author: Nolan, Godfrey
Other Authors: Zukowski, John
Format: eBook
Language:English
Published: Berkeley, Calif. Apress 2004
Series:The expert's voice in Java
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02195nmm a2200457 u 4500
001 EB001916852
003 EBX01000000000000001079754
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1430207396 
020 |a 9781430254690 
020 |a 9781430207399 
050 4 |a QA76.73.J38 
100 1 |a Nolan, Godfrey 
245 0 0 |a Decompiling Java  |c Godfrey Nolan ; technical reviewer, John Zukowski 
246 3 1 |a Java 
260 |a Berkeley, Calif.  |b Apress  |c 2004 
300 |a 1 online resource 
505 0 |a Includes bibliographical references and index 
653 |a Engineering & Applied Sciences / hilcc 
653 |a Java (Computer program language) / fast 
653 |a Computer Science / hilcc 
653 |a Java (Langage de programmation) 
653 |a Java (Computer program language) / http://id.loc.gov/authorities/subjects/sh95008574 
700 1 |a Zukowski, John 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a The expert's voice in Java 
028 5 0 |a 10.1007/978-1-4302-0739-9 
776 |z 9781430207399 
776 |z 1590592654 
776 |z 1430207396 
776 |z 1430254696 
776 |z 9781430254690 
776 |z 9781590592656 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430207399/?ar  |x Verlag  |3 Volltext 
082 0 |a 620 
082 0 |a 005.13/3 
082 0 |a 500 
520 |a Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property. For example, how secure is your code after you run an obfuscator? The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do