'Surreptitious Software' Guides Developers in Protecting Intellectual Property

Patrick Avery

The past decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection" is a comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford and the performance penalty they incur.


An excerpt from this book, written by Christian Collberg and Jasvir Nagra, is now in the Knowledge Network. This 58-page excerpt of the first chapter looks at "What is Surreptitious Software?"

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.