Surreptitious Software false
By:Jasvir Nagra,Christian Collberg
Published on 2009-07-24 by Pearson Education
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur. Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques. Coverage includes Mastering techniques that both attackers and defenders use to analyze programs Using code obfuscation to make software harder to analyze and understand Fingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and data Strengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithms Using hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed system Understanding the theoretical limits of code obfuscation
This Book was ranked at 40 by Google Books for keyword Software.
Book ID of Surreptitious Software's Books is mig-bH3u0Z0C, Book which was written byJasvir Nagra,Christian Collberghave ETAG "/rlCSuL6cOo"
Book which was published by Pearson Education since 2009-07-24 have ISBNs, ISBN 13 Code is 9780132702034 and ISBN 10 Code is 0132702037
Reading Mode in Text Status is true and Reading Mode in Image Status is true
Book which have "792 Pages" is Printed at BOOK under CategoryComputers
Book was written in en
eBook Version Availability Status at PDF is falseand in ePub is false
Book Preview
Surreptitious Software Free Download
Surreptitious Software PDF Free
Surreptitious Software PDF
Surreptitious Software Free
Surreptitious Software Books
Surreptitious Software Books Free
Surreptitious Software Audio Books
Surreptitious Software full-text Books
Surreptitious Software Online Read
Surreptitious Software Kindle
Surreptitious Software Review
Surreptitious Software Book Summary
Surreptitious Software Book PDF
Surreptitious Software Book Review
Surreptitious Software -Jasvir Nagra,Christian Collberg- Google Books
Surreptitious Software byJasvir Nagra,Christian Collberg- Goodreads
Surreptitious Software byJasvir Nagra,Christian Collberg
Surreptitious Software -Jasvir Nagra,Christian Collberg- 9780132702034
Surreptitious Software -Jasvir Nagra,Christian Collberg- 0132702037
Surreptitious Software E-Books
Surreptitious Software byJasvir Nagra,Christian CollbergE-Books
Surreptitious Software byJasvir Nagra,Christian Collbergebooks
Surreptitious Software byJasvir Nagra,Christian Collberg- Full Text Free Book - Full Text Archive
Surreptitious Software byJasvir Nagra,Christian Collberg- Full Text Free Book
Surreptitious Software byJasvir Nagra,Christian Collberg- Full Text Archive
Amazon.com: Surreptitious Software byJasvir Nagra,Christian Collberg
Tidak ada komentar:
Posting Komentar