Surreptitious Software

Obfuscation, Watermarking, and Tamperproofing for Software Protection

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Surreptitious Software

More books from Pearson Education

bigCover of the book CCNA Voice Portable Command Guide by
bigCover of the book Timing Analysis and Simulation for Signal Integrity Engineers by
bigCover of the book Writing Effective Use Cases by
bigCover of the book Inside / Outside by
bigCover of the book Level 1: Jennifer Lopez by
bigCover of the book The Sign of the Four: York Notes for GCSE (9-1) by
bigCover of the book How to Get Out of Credit Card Debtor's Prison by
bigCover of the book How Do Traders and Investors Use Charts with Technical Analysis? by
bigCover of the book The Dynamics of Indecision by
bigCover of the book Windows Lockdown! by
bigCover of the book A Photographer's Guide to Focus and Autofocus by
bigCover of the book Sams Teach Yourself the Twitter API in 24 Hours by
bigCover of the book Blood and Nukes for Oil by
bigCover of the book Adobe InDesign CC Classroom in a Book (2014 release) by
bigCover of the book The Glitterguru on Photoshop by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy