Surreptitious Software

Obfuscation, Watermarking, and Tamperproofing for Software Protection

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Surreptitious Software

More books from Pearson Education

bigCover of the book Microsoft Project 2013 Step by Step by
bigCover of the book Basic Principles and Calculations in Process Technology by
bigCover of the book Improve your speed reading skills by
bigCover of the book Microsoft SQL Server 2008 Administrator's Pocket Consultant by
bigCover of the book CCIE Security Exam Quick Reference Sheets by
bigCover of the book The Truth About Pay-Per-Click Search Advertising by
bigCover of the book InfoPath with SharePoint 2010 How-To by
bigCover of the book Ruthless Execution by
bigCover of the book SharePoint 2010 Development with Silverlight by
bigCover of the book Being a Caring Leader by
bigCover of the book Meet the iPad 2 Pocket Guide by
bigCover of the book iOS UICollectionView by
bigCover of the book Inspire! by
bigCover of the book Reflections on Management by
bigCover of the book Microsoft .NET - Architecting Applications for the Enterprise by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy