Protecting Your Mobile App IP: The Mini Missing Manual

Nonfiction, Computers, General Computing
Cover of the book Protecting Your Mobile App IP: The Mini Missing Manual by Richard Stim, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Richard Stim ISBN: 9781449302795
Publisher: O'Reilly Media Publication: December 3, 2010
Imprint: O'Reilly Media Language: English
Author: Richard Stim
ISBN: 9781449302795
Publisher: O'Reilly Media
Publication: December 3, 2010
Imprint: O'Reilly Media
Language: English

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do happen, you'll have the legal ammunition you need to recover your losses and, in some cases, get money to pay attorney fees. Taking these steps will also reinforce your legal rights in the event that another company wants to acquire your apps.

The four methods include:

  • Trade secret protection. Want to show your app to others -- investors, beta testers, or contractors -- before it's available to the public? Learn what trade secrets are and how you can protect them.
  • Copyright protection. Protect your whole app as well as its individual parts, such as the underlying code, appearance, and the collection of data within it.
  • Trademark protection. Protect your app's name, slogan, or logo. And learn how to file an application for trademark registration.
  • Permissions. Learn how and when to get permission to reuse material from other sources, like photos, data, video, or audio clips.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do happen, you'll have the legal ammunition you need to recover your losses and, in some cases, get money to pay attorney fees. Taking these steps will also reinforce your legal rights in the event that another company wants to acquire your apps.

The four methods include:

More books from O'Reilly Media

Cover of the book Getting Started with Couchbase Server by Richard Stim
Cover of the book Designing for Behavior Change by Richard Stim
Cover of the book HTML & XHTML: The Definitive Guide by Richard Stim
Cover of the book Virtualization: A Manager's Guide by Richard Stim
Cover of the book Making Isometric Social Real-Time Games with HTML5, CSS3, and JavaScript by Richard Stim
Cover of the book Building Progressive Web Apps by Richard Stim
Cover of the book Windows XP Pocket Reference by Richard Stim
Cover of the book Crossing Platforms A Macintosh/Windows Phrasebook by Richard Stim
Cover of the book StartWithXML: Making the Case for Applying XML to a Publishing Workflow by Richard Stim
Cover of the book Building Data Science Teams by Richard Stim
Cover of the book Building Maintainable Software, Java Edition by Richard Stim
Cover of the book Learning Python by Richard Stim
Cover of the book DVD Studio Pro 3: In the Studio by Richard Stim
Cover of the book Managing RAID on Linux by Richard Stim
Cover of the book The Architecture of Privacy by Richard Stim
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy