Collberg, C., & Nagra. (2010). Surreptitious software: Obfuscation, watermarking, and tamperproofing for software protection. Addison-Wesley.
Chicago Style (17th ed.) CitationCollberg, Christian, and Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Upper Saddle River, NJ: Addison-Wesley, 2010.
MLA (8th ed.) CitationCollberg, Christian, and Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley, 2010.
Warning: These citations may not always be 100% accurate.