Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 53,34
Anzahl: 1 verfügbar
In den WarenkorbZustand: Used. pp. 280 68:B&W 7 x 10 in or 254 x 178 mm Case Laminate on White w/Gloss Lam.
Sprache: Englisch
Verlag: APress, United States, New York, 2004
ISBN 10: 1590592654 ISBN 13: 9781590592656
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
EUR 55,97
Anzahl: 3 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property. For example, how secure is your code after you run an obfuscator? The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Zustand: Used. pp. 280.
Zustand: New. 2004. 1st ed. hardcover. . . . . . Books ship from the US and Ireland.
Anbieter: Vulkaneifel Bücher, Birgel, Deutschland
Zustand: Sehr gut. Auflage: 2004. 280 Seiten leichte Druckstelle am Cover, kleine Lagerspuren am Buch, Inhalt einwandfrei und ungelesen 212770,212806 Sprache: Englisch Gewicht in Gramm: 715 23,6 x 18,3 x 2,3 cm, Gebundene Ausgabe.
Taschenbuch. Zustand: Neu. Neuware -Both Java and .NET use the idea of a 'virtual machine,' or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property.For example, how secure is your code after you run an obfuscator The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 284 pp. Englisch.
EUR 65,17
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Umfassende Strategien zum Schutz Ihrer Daten und ProgrammeMit vollst?digen Quellcodes von Decompilern und ObfuscatorenHintergrundwissen zum Schutz gegen SoftwarepiraterieGodfrey Nolan is president of RIIS LLC, where he specializes i.
Buch. Zustand: Neu. Neuware - Both Java and .NET use the idea of a 'virtual machine,' or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property.For example, how secure is your code after you run an obfuscator The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do.