Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection /
"This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing professional in software protection."--Mikhail Atallah, Distinguished Professor of Computer Science at Purdue Uni...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Collberg, Christian |
Otros Autores: | Nagra, Jasvir |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
Addison-Wesley,
2009, ©2010.
|
Colección: | Addison-Wesley software security series.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Intelligent watermarking techniques /
Publicado: (2004) -
Intelligent watermarking techniques /
Publicado: (2004) -
Modern cryptanalysis : techniques for advanced code breaking /
por: Swenson, Christopher, 1983-
Publicado: (2008) -
Managing intellectual assets in the digital age /
por: Matsuura, Jeffrey H., 1957-
Publicado: (2003) -
Malicious cryptography : exposing cryptovirology /
por: Young, Adam, 1972-, et al.
Publicado: (2004)