As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!
Developers face problems created by others every day - when asked to maintain someone else's code, or when forced to use a third-party library without documentation. They might come across exactly the feature they need to implement but can't get hold of the source code. They might spend frustrating hours trying different solutions that don't work. Instead, the techniques in this book will teach developers to decompile, patch, and reverse-engineer applications, to better understand their implementation, and to work more efficiently with applications developed by others.Covert Java offers a unique approach to solving common Java problems, from combating obfuscation in code, to patching core classes to change the intended function of an application. Each chapter focuses on a technique that solves a specific problem - outlining the problem, demonstrating the solution, then suggesting additional ideas for developers to test out the technique. Many chapters include anecdotal examples of the technique in action, and finish with summaries to ensure developers understand the most crucial points of the chapter.
The first book on hacking software written specifically for the Java developer. 2500 years ago, the great general Sun Tzu said, "If you know the enemy and know yourself, you need not fear the result of a hundred battles." If you're a Java developer, this book is a giant step toward knowing your enemy.
--Kevin Bedell, Editor-in-Chief, LinuxWorld; co-author, "Struts Kick Start," "Programming Apache Axis"
About the Author
Alex Kalinovsky was born in Ukraine in 1974 and moved to the United States in 1997. He has been in the IT industry for more than 10 years, with experience that ranges from writing C and C++ applications to developing enterprise Java solutions. Since 1997, Alex has worked solely with Java and is proud to be one of its original evangelists. He has taught more than 15 classes on Enterprise Java technologies and worked as a mentor for many teams. Alex has written for various publications, including JavaWorld, Sun JavaSoft, Information Week and the Washington Post. He is a Certified Enterprise Java Architect consulting for leading companies that use Java and J2EE. He is also a lead architect for WebCream, a revolutionary Java product that bridges Swing and HTML. In his spare time, Alex enjoys traveling, reading, wind-surfing, snowboarding and bodybuilding.