Surreptitious Software

Obfuscation, Watermarking, and Tamperproofing for Software Protection

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Surreptitious Software

More books from Pearson Education

bigCover of the book Information Security by
bigCover of the book The Scrumban [R]Evolution by
bigCover of the book Essential SharePoint 2010 by
bigCover of the book Persistence in the Enterprise by
bigCover of the book NCLEX-RN Exam Cram by
bigCover of the book CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721) by
bigCover of the book Doing What Matters by
bigCover of the book Writing for Visual Thinkers by
bigCover of the book BBC FRENCH PHRASE BOOK & DICTIONARY by
bigCover of the book Apple Training Series: GarageBand '11 by
bigCover of the book CCNA Data Center DCICN 200-150 Official Cert Guide by
bigCover of the book Create Dynamic Charts in Microsoft Office Excel 2007 and Beyond by
bigCover of the book Using Google Apps by
bigCover of the book Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: Foundation learning for the CCNP TSHOOT 642-832 by
bigCover of the book Simple Post Processing by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy