|
|
|
|
| LEADER |
01181cam a2200265 7i4500 |
| 001 |
0000013298 |
| 005 |
20151104090000.0 |
| 005 |
##20151104114000.0 |
| 003 |
##MY-KlINT |
| 020 |
# |
# |
|a 9780321549259
|
| 039 |
# |
9 |
|y 201511041140
|z VLOAD
|
| 090 |
0 |
0 |
|a 005.8
|b COL
|
| 100 |
1 |
# |
|a Collberg, Christian
|
| 245 |
1 |
0 |
|a Surreptitious software :
|b obfuscation, watermarking, and tamperproofing for software protection /
|c Christian Collberg, Jasvir Nagra.
|
| 260 |
# |
# |
|a Upper Saddle River, NJ:
|b Addison-Wesley,
|c 2010.
|
| 300 |
# |
# |
|a xxvii, 748p:
|b ill;
|c 23cm.
|
| 490 |
0 |
# |
|a Addison-Wesley software security series
|
| 504 |
# |
# |
|a Includes bibliographical references and index.
|
| 505 |
0 |
# |
|a What is surreptitious software? -- Methods of attack and defense -- Program analysis -- Code obfuscation -- Obfuscation theory -- Dynamic obfuscation -- Software tamperproofing -- Software watermarking -- Dynamic watermarking -- Software similarity an
|
| 650 |
# |
0 |
|a Copyright and electronic data processing --
|z United States
|
| 650 |
# |
0 |
|a Computer security
|
| 650 |
# |
0 |
|a Data protection
|
| 650 |
# |
0 |
|a Cryptography
|
| 700 |
0 |
# |
|a Nagra,
|h Jasvir.
|
| 999 |
|
|
|a 1109067229
|b BOOK
|c Main Non-Fiction
|e INTAN BK
|