Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection /

Bibliographic Details
Main Author: Collberg, Christian
Other Authors: Nagra
Format: Book
Published: Upper Saddle River, NJ: Addison-Wesley, 2010.
Series:Addison-Wesley software security series
Subjects:
LEADER 01181cam a2200265 7i4500
001 0000013298
005 20151104090000.0
005 ##20151104114000.0
003 ##MY-KlINT
020 # # |a 9780321549259  
039 # 9 |y 201511041140  |z VLOAD 
090 0 0 |a 005.8   |b COL 
100 1 # |a Collberg, Christian 
245 1 0 |a Surreptitious software :   |b obfuscation, watermarking, and tamperproofing for software protection /   |c Christian Collberg, Jasvir Nagra. 
260 # # |a Upper Saddle River, NJ:   |b Addison-Wesley,   |c 2010. 
300 # # |a xxvii, 748p:   |b ill;   |c 23cm. 
490 0 # |a Addison-Wesley software security series 
504 # # |a Includes bibliographical references and index. 
505 0 # |a What is surreptitious software? -- Methods of attack and defense -- Program analysis -- Code obfuscation -- Obfuscation theory -- Dynamic obfuscation -- Software tamperproofing -- Software watermarking -- Dynamic watermarking -- Software similarity an 
650 # 0 |a Copyright and electronic data processing --   |z United States  
650 # 0 |a Computer security  
650 # 0 |a Data protection  
650 # 0 |a Cryptography  
700 0 # |a Nagra,   |h Jasvir.  
999 |a 1109067229  |b BOOK  |c Main Non-Fiction  |e INTAN BK