Surreptitious Software

Obfuscation, Watermarking, and Tamperproofing for Software Protection

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Surreptitious Software

More books from Pearson Education

bigCover of the book Queuing at eCycle Services by
bigCover of the book Adaptive Software Development by
bigCover of the book Romeo and Juliet: York Notes for GCSE by
bigCover of the book Mastering the Requirements Process by
bigCover of the book MySQL 5.0 Certification Study Guide by
bigCover of the book Blockchain for Business by
bigCover of the book Bird Photography: From Snapshots to Great Shots by
bigCover of the book macOS Support Essentials 10.14 - Apple Pro Training Series by
bigCover of the book Adobe ColdFusion 9 Web Application Construction Kit, Volume 3 by
bigCover of the book CCVP CIPT Quick Reference by
bigCover of the book Photographers at Work by
bigCover of the book Water Management Models by
bigCover of the book Sams Teach Yourself Mac OS X Panther All In One by
bigCover of the book Creative 52 by
bigCover of the book Computer Security Fundamentals by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy