Collberg, Christian.
Surreptitious software obfuscation, watermarking, and tamperproofing for software protection / [electronic resource] :
Christian Collberg, Jasvir Nagra.
- Upper Saddle River, N.J. : Addison-Wesley, 2009, c2010.
- xxvii, 748 p. : ill. ; 23 cm.
- Addison-Wesley software security series .
- Addison-Wesley software security series. Safari Books Online. .
Includes bibliographical references and index.
What is surreptitious software? -- Methods of attack and defense -- Program analysis -- Code obfuscation -- Obfuscation theory -- Dynamic obfuscation -- Software tamperproofing -- Software watermarking -- Dynamic watermarking -- Software similarity analysis -- Hardware for protecting software.
Electronic reproduction.
Boston, Mass. :
Safari Books Online,
2009.
Mode of access: World Wide Web.
Available to subscribing institutions.
9780321591258 0321591259
CL0500000048 Safari Books Online
Computer security.
Cryptography.
Data protection.
Copyright and electronic data processing--United States.
Electronic books.