Surreptitious Software

Obfuscation, Watermarking, and Tamperproofing for Software Protection

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Surreptitious Software

More books from Pearson Education

bigCover of the book HealthCare's Corporate Social Responsibility Program by
bigCover of the book MPLS Fundamentals by
bigCover of the book CompTIA A+ 220-901 and 220-902 Practice Questions Exam Cram by
bigCover of the book Financing the Future by
bigCover of the book How to Make Money Marketing Your Business with Tumblr by
bigCover of the book Influence Marketing by
bigCover of the book Exam Ref 70-486 Developing ASP.NET MVC 4 Web Applications (MCSD) by
bigCover of the book The Complete Guide to B2B Marketing by
bigCover of the book Microsoft Exchange Server 2010 Best Practices by
bigCover of the book Exam Ref 70-764 Administering a SQL Database Infrastructure by
bigCover of the book Performing Information Governance by
bigCover of the book Digital Character Animation 3 by
bigCover of the book Essential Lessons on Leadership (Collection) by
bigCover of the book Joomla!® 3 Explained by
bigCover of the book Microsoft Office PowerPoint 2007 for Windows by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy