February 12, 2021   |   by admin

Source code for ‘Decompiling Java’ by Godfrey Nolan – Apress/decompiling-java. Listings 6 – 45 Manufacturing Manager: Tom Debolski. Ubrary of Congress Cataloging-in- Publicatlon Data. Nolan, Godfrey. Decompiling Java I Godfrey Nolan. Author/s: Godfrey Nolan Publisher: Apress Category: Advanced Java Review by: Lasse Koskela Rating: 7 horseshoes.

Author: Tuzahn Vikora
Country: Mauritania
Language: English (Spanish)
Genre: Politics
Published (Last): 21 June 2013
Pages: 417
PDF File Size: 20.3 Mb
ePub File Size: 1.88 Mb
ISBN: 159-6-71996-270-3
Downloads: 86850
Price: Free* [*Free Regsitration Required]
Uploader: Kigashakar

There’s a problem loading this menu right now. Tools of the Trade. This single location in Australian Capital Territory: You do the math. Page 1 of 1 Start over Page 1 of 1.

Similar Threads

Then, it will delve into the most intimate details of her bytecode attributes and show you how to manipulate them efficiently. ComiXology Thousands of Digital Comics. See other reviewers’ comments on how it pushes-and-pops strings. AmazonGlobal Ship Orders Internationally.

Amazon Advertising Find, attract, and engage customers. University of South Australia Library. But I was also tempted to jvaa it one less star on the basis of its content. After all, it probably has proprietary methods that are not covered by any patents you might have.

Our chat was both enjoyable and enlightening. There is a historical survey and a survey of available products. Nolan has had a healthy obsession with reverse engineering bytecode since he wrote Decompile Once, Run Anywhere, which first appeared in Web Techniques in Todfrey But just add a “break” statement and you’ll break the decompiler. IIRC, he admits this in the text.


Decompiling Java: Godfrey Nolan: : Books

On the other hand, the author managed to light some bulbs in my head along the way and I actually enjoyed reading his text – especially the vodfrey about creating a decompiler using JLex and CUP which I’ve also found a bit too intimidating to actually look into.

Selected pages Title Page. In just or so pages, you’ll go through legalities related to decompiling Java code, learn the basics of Java’s class file format, get a brief run-down of tools available for deconpiling and obfuscating Java code, all the way through different methods employed by obfuscation tools.

This single location in Tasmania: Pages with related products. A Handbook of Agile Software Craftsmanship.

Amazon Restaurants Food delivery from local restaurants. So it’s somewhere between 1. Advanced Java Review by: The book shows that the big problem with Java bytecode is that decompilers for it have a far easier time than decompilers for actual assembly code, whatever the specific hardware for the latter. While you can copyright the source, Nolan points out that this may not stop someone from decompiling and reimplementing your “secret” methods.

My library Help Advanced Book Search. Which makes this one-of-a-kind book extremely useful: As another “reviewer” pointed out, the author was a journalist before becoming an expert on decompiling.

If a Pentium, then you might only support a recent linux or Microsoft OS on top of it. Add a tag Cancel Be the first to add a tag for this edition.


He has written numerous articles for magazines and newspapers in the United States, the United Kingdom, and Ireland. Understanding Java Virtual Machine. Decompilers are something of a black box to most programmers.

Alexa Actionable Analytics decompiljng the Web. If you’ve read a compiler textbook, you know more about the subject of this book than the author does. Book Review Team ].

In summary, “Decompiling Java” is a good overview of decompilation in Java and it has a couple of real gems inside, but if you’re looking for a manual for dissecting class files or the JVM, it might not the book you’re looking for. Learn more about Amazon Giveaway. Account Options Sign in. After discussing some legal and moral issues and telling you how to protect yourself, this book will teach you how to approach her and ask her out politely.

Christina Cifuentes’ thesis, papers by Laurie Hendren’s group, etc. You’ll also see the many different ways that you can protect your code, from obfuscation to fingerprinting, and you’ll build your own simple obfuscator along the way. Comments and reviews What are comments? More godfgey at Amazon.