Surreptitious software

obfuscation, watermarking, and tamperproofing for program protection

1st ed.
  • 0 Ratings
  • 1 Want to read
  • 1 Currently reading
  • 0 Have read
Surreptitious software
Christian Collberg
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 1 Want to read
  • 1 Currently reading
  • 0 Have read

Buy this book

Last edited by ImportBot
December 19, 2023 | History

Surreptitious software

obfuscation, watermarking, and tamperproofing for program protection

1st ed.
  • 0 Ratings
  • 1 Want to read
  • 1 Currently reading
  • 0 Have read

This edition doesn't have a description yet. Can you add one?

Publish Date
Publisher
Addison-Wesley
Language
English
Pages
776

Buy this book

Edition Availability
Cover of: Surreptitious software

Add another edition?

Book Details


Table of Contents

What is surreptitious software?
Methods of attack and defense
Program analysis
Code obfuscation
Obfuscation theory
Dynamic obfuscation
Software tamperproofing
Software watermarking
Dynamic watermarking
Software similarity analysis
Hardware for protecting software.

Edition Notes

Includes bibliographical references and index.

Published in
Upper Saddle River, NJ

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 C6165 2009, QA76.9.A25 C6165 2010, QA76.9.A25C6165 2009

The Physical Object

Pagination
p. cm.
Number of pages
776

ID Numbers

Open Library
OL23208072M
ISBN 10
0321549252
LCCN
2009015520
Library Thing
8286081
Goodreads
6695783

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
December 19, 2023 Edited by ImportBot import existing book
August 21, 2020 Edited by ImportBot import existing book
March 10, 2010 Created by WorkBot work found