Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

Quick Quiz

  1. What are the means of protecting intellectual property in Java applications?

  2. Which transformations provided by obfuscators offer the strongest protection?

  3. For each of the potential problems listed in this chapter, which transformation(s) can cause it?

  4. What is the most efficient way to study the obfuscated code?

  • + Share This
  • 🔖 Save To Your Account