Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Condition: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Hardcover. Condition: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2014
ISBN 10: 1430254696 ISBN 13: 9781430254690
Language: English
Seller: Grand Eagle Retail, Mason, OH, U.S.A.
Paperback. Condition: new. Paperback. Both Java and .NET use the idea of a "virtual machine," or VM. And while VMs are useful for some purposes, they undermine the security of your source code, because creation can be reversed, or decompiled. Which makes this one-of-a-kind book extremely useful: you must understand decompilation, to properly protect your intellectual property.For example, how secure is your code after you run an obfuscator? The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. This book redresses the imbalance by providing insights into the features and limitations of today's decompilers and obfuscators, and offering a detailed look at what JVMs actually do. The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
US$ 38.45
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
US$ 37.13
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
US$ 39.76
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Condition: New.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
US$ 47.93
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, DE, 2014
ISBN 10: 1430254696 ISBN 13: 9781430254690
Language: English
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condition: New.
US$ 55.51
Convert currencyQuantity: 1 available
Add to basketBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
Hardcover. Condition: new. Hardcover. Both Java and . NET use the idea of a "virtual machine" (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or "decompiled". This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets. While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? To answer these questions requires a greater understanding of the Java bytecodes and the Java Virtual Machine (JVM) than in any book yet published.This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do. Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract "virtual processor" and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. You then write a relatively small piece of code for each real processor you want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s! The book will answer questions like this, and provide more thorough information about Java byte codes and the Java Virtual Machine (JVM) than any other book on the market. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Condition: As New. Unread book in perfect condition.
Published by Springer-Verlag Berlin and Heidelberg GmbH and Co. KG, DE, 2014
ISBN 10: 1430254696 ISBN 13: 9781430254690
Language: English
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
US$ 60.60
Convert currencyQuantity: 8 available
Add to basketPaperback. Condition: New.
Published by Apress, Incorporated, 2004
ISBN 10: 1590592654 ISBN 13: 9781590592656
Language: English
Seller: Books Puddle, New York, NY, U.S.A.
Condition: Used. pp. 280.
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2014
ISBN 10: 1430254696 ISBN 13: 9781430254690
Language: English
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
US$ 54.70
Convert currencyQuantity: 15 available
Add to basketCondition: New. Num Pages: 294 pages, biography. BIC Classification: UMZ. Category: (G) General (US: Trade). Dimension: 235 x 191 x 15. Weight in Grams: 540. . 2014. Softcover reprint of the original 1st ed. Paperback. . . . .
Hardback. Condition: New. Both Java and . NET use the idea of a "virtual machine" (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or "decompiled". This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets. While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? To answer these questions requires a greater understanding of the Java bytecodes and the Java Virtual Machine (JVM) than in any book yet published.This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do. Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract "virtual processor" and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. You then write a relatively small piece of code for each real processor you want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s!
US$ 48.84
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Published by Apress, Incorporated, 2004
ISBN 10: 1590592654 ISBN 13: 9781590592656
Language: English
Seller: Majestic Books, Hounslow, United Kingdom
US$ 58.94
Convert currencyQuantity: 1 available
Add to basketCondition: Used. pp. 280 68:B&W 7 x 10 in or 254 x 178 mm Case Laminate on White w/Gloss Lam.
US$ 54.09
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
US$ 51.58
Convert currencyQuantity: 10 available
Add to basketPaperback. Condition: New.
Hardback or Cased Book. Condition: New. Decompiling Java. Book.
US$ 54.07
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2014
ISBN 10: 1430254696 ISBN 13: 9781430254690
Language: English
Seller: Kennys Bookstore, Olney, MD, U.S.A.
Condition: New. Num Pages: 294 pages, biography. BIC Classification: UMZ. Category: (G) General (US: Trade). Dimension: 235 x 191 x 15. Weight in Grams: 540. . 2014. Softcover reprint of the original 1st ed. Paperback. . . . . Books ship from the US and Ireland.
Published by Apress, Incorporated, 2004
ISBN 10: 1590592654 ISBN 13: 9781590592656
Language: English
Seller: Biblios, Frankfurt am main, HESSE, Germany
US$ 64.20
Convert currencyQuantity: 1 available
Add to basketCondition: Used. pp. 280.
US$ 77.25
Convert currencyQuantity: 8 available
Add to basketHardback. Condition: New. Both Java and . NET use the idea of a "virtual machine" (VM) rather than a true executable. While very useful for some purposes, VMs make your source code and hence your intellectual property (IP) inherently less secure because the process can be reversed or "decompiled". This book is useful because you must understand how decompilation works in order to properly protect your IP. Anyone interested in protecting Java code from prying eyes will want to buy this one of a kind book as it separates fact from fiction about just how ineffective obfuscators are at protecting your corporate secrets. While it is very easy for anyone to decompile Java code and almost as easy to run it through an obfuscation protection tool, there is very little information on just what happens when you do this. How secure is your code after you run an obfuscator, for example? To answer these questions requires a greater understanding of the Java bytecodes and the Java Virtual Machine (JVM) than in any book yet published.This book redresses the imbalance by providing insights into the features and limitations of todays decompilers and obfuscators, as well as offering a detailed look at what JVMs actually do. Virtual machine is the computer science term used when (most often in an attempt to gain greater portability) you create an abstract "virtual processor" and write code for it instead of having your compiler generate actual machine language for a chip like the Pentium 4. You then write a relatively small piece of code for each real processor you want the code to run. This translates the virtual machine language to the real machine language of your processor. The intermediary code for the virtual machine is what can more easily be decompiled, although with a loss of security, since in order for the code to be converted to real machine language it must be relatively transparent and not just a sequence of 0s and 1s!
Condition: New. pp. 284.
US$ 68.46
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.