1.5 MB | 3 files | PDF, DOC
Using extensive sample code, this 58-page book chapter gives an overview of software piracy and tampering protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking.
The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. "Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection" is a comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur.
Authors Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
This 58-page excerpt of the first chapter looks at "What is Surreptitious Software?"
The attached Zip file includes:
Microsoft Project 2013 is a project management software program that helps you plan projects and keep them on track, no matter how big or small. ... More >>
Microsoft PowerPoint 2013 is a slide-based presentation software that helps you show your information in a organized, visual manner for easier understanding. ... More >>
Chapter 2 provides an introduction to the role CRM systems play in an organization, examines the anatomy of a CRM system and the type of CRM systems available, and looks at the CRM's role as keeper of customer knowledge assets. ... More >>