Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property.
For example, how secure is your code after you run an obfuscator? The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Godfrey Nolan is president of RIIS LLC, where he specializes in website optimization. He has written numerous articles for magazines and newspapers in the United States, the United Kingdom, and Ireland. Nolan has had a healthy obsession with reverse engineering bytecode since he wrote Decompile Once, Run Anywhere, which first appeared in Web Techniques in September 1997.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Artikel-Nr. ABNR-122257
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: Used. pp. 280 68:B&W 7 x 10 in or 254 x 178 mm Case Laminate on White w/Gloss Lam. Artikel-Nr. 7586460
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property. For example, how secure is your code after you run an obfuscator? The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Artikel-Nr. GOR009273559
Anzahl: 3 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: Used. pp. 280. Artikel-Nr. 18294217
Anzahl: 1 verfügbar
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2004. 1st ed. hardcover. . . . . . Books ship from the US and Ireland. Artikel-Nr. V9781590592656
Anzahl: 15 verfügbar
Anbieter: Vulkaneifel Bücher, Birgel, Deutschland
Zustand: Sehr gut. Auflage: 2004. 280 Seiten leichte Druckstelle am Cover, kleine Lagerspuren am Buch, Inhalt einwandfrei und ungelesen 212770,212806 Sprache: Englisch Gewicht in Gramm: 715 23,6 x 18,3 x 2,3 cm, Gebundene Ausgabe. Artikel-Nr. 156235
Anzahl: 5 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Umfassende Strategien zum Schutz Ihrer Daten und ProgrammeMit vollst?digen Quellcodes von Decompilern und ObfuscatorenHintergrundwissen zum Schutz gegen SoftwarepiraterieGodfrey Nolan is president of RIIS LLC, where he specializes i. Artikel-Nr. 458519961
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware - Both Java and .NET use the idea of a 'virtual machine,' or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property.For example, how secure is your code after you run an obfuscator The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do. Artikel-Nr. 9781590592656
Anzahl: 2 verfügbar