Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Follow the Author

Something went wrong. Please try your request again later.


Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering Paperback – May 13, 2004

3.6 out of 5 stars 6 ratings

See all 3 formats and editions Hide other formats and editions
Price
New from Used from
Paperback
$21.47
$66.00 $2.47

Limited-time deal : Top eBooks under $5 pantry

click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Editorial Reviews

From the Inside Flap

Buzz about Covert Java

"Covert Java" provides a fascinating and look at behind the scenes Java development tactics that are usually the domain of seasoned veterans. Definitely a read for those who want to master Java.

--Floyd Marinescu, Author, EJB Design Patterns; General Manager & founder of TheServerSide Communities.

Every now and then, a Java book comes along that you must add to your library. "Covert Java" is one of those books.

"Covert Java" explores the topic of hacking Java code -- to solve problems, not to create them. The author explores various hacking techniques, such as class decompilation, patching, and logic tracing; as well as tools (such as FAR and JODE) for simplifying the hacking experience. A variety of "Stories from the Trenches" provides real-life experiences where hacking techniques were needed to save projects from disaster. The end-of-chapter quizzes help you master the book's wealth of valuable and useful information.

This is a book for the good guys, so miscreants beware. The author has done a fantastic job exploring a delicate subject. For all Java developers, especially developers involved in J2EE and other intense Java projects, "Covert Java" is a must-have book. I heartily recommend it.

--Jeff Friesen, author and columnist, JavaWorld's "Java 101"

The first book on hacking software written specifically for the Java developer. 2500 years ago, the great general Sun Tzu said, "If you know the enemy and know yourself, you need not fear the result of a hundred battles." If you're a Java developer, this book is a giant step toward knowing your enemy.

--Kevin Bedell, Editor-in-Chief, LinuxWorld; co-author, "Struts Kick Start," "Programming Apache Axis"

"Covert Java" goes beyond the advanced topics, discussing those things that only hardcore programming gurus know (decompiling, security, bytecode hacking, etc). I wish I had read this book at the beginning of my carreer. It would have saved me countless hours of 'learning the hard way'.

I'm glad that someone finally has the courage to write such a book. "Covert Java" is full of controversial, nontrivial, and incredibly useful information. This book fills a void in the Java programming space that no other books can fill.

--Emmanuel Proulx, Web Developer; WebLogic 7 Certified Engineer

"Covert Java" is all about getting under the hood of Java applications; from manipulating the VM to eavesdropping on JDBC. A very practical guide, it gives you the techniques and tools to understand how Java works at the bytecode level and why this is important.

--Craig Pfeifer, Senior Technical Consultant, Impact Innovations Group

The authors did a great job describing useful techniques and tools to solve real application problems using intrusive techniques in java environment. A must read for anyone looking to solve real application problems or to understand a specific protocol implementation.

--Krishna V.S. Chaganti, Senior J2EE Architect and co-author, "J2EE Developer’s Handbook"

The author is revealing information that is unknown to the common Java programmer and it should scare them to death: the author describes how to decompile and hack classes, circumvent security and licensing mechanisms, and intercept seemingly "secure" communications. This information and the tools he describes have been around in hacking circles for years, but by bringing this information public, he teaches us to be better programmers, to write stronger and more secure software!

--Steven Haines, author and J2EE evangelist, Quest Software

From the Back Cover

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!


Product details


Free sleep tracks
A good night's sleep is essential for keeping our minds and bodies strong. Explore Audible's collection of free sleep and relaxation audio experiences. Learn more

Customer reviews

3.6 out of 5 stars
3.6 out of 5
6 customer ratings
How does Amazon calculate star ratings?
Reviewed in the United States on June 19, 2015
Verified Purchase
Reviewed in the United States on December 8, 2009
One person found this helpful
Comment Report abuse
Reviewed in the United States on September 10, 2006
2 people found this helpful
Comment Report abuse
Reviewed in the United States on February 9, 2006
2 people found this helpful
Comment Report abuse
Reviewed in the United States on September 7, 2005

Top international reviews

Quicksilver
3.0 out of 5 stars Too much waffle, padding and moralising
Reviewed in the United Kingdom on October 23, 2005
Verified Purchase
4 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse