Login       My Wishlist
  My Cart
$0.00 / 0 items
 
EMS Linux
Utilizing the Best Tools With Linux
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   Software Design, Testing & Engineering   Quality Control

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection


Mega Sale! Free Shipping Included! Save 26% on the Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Addison-Wesley Professional at EMS Linux. MPN: Illustrations. Hurry! Limited time offer. Offer valid only while supplies last. “This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher,


Product Description

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”
    —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University

Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering

The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance  penalty they incur.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.

Coverage includes
  • Mastering techniques that both attackers and defenders use to analyze programs
  • Using code obfuscation to make software harder to analyze and understand
  • Fingerprinting software to identify its author and to trace software pirates
  • Tamperproofing software using guards that detect and respond to illegal modifications of code and data
  • Strengthening content protection through dynamic watermarking and dynamic obfuscation
  • Detecting code theft via software similarity analysis and birthmarking algorithms
  • Using hardware techniques to defend software and media against piracy and tampering
  • Detecting software tampering in distributed system
  • Understanding the theoretical limits of code obfuscation

Additional Information

Manufacturer:Addison-Wesley Professional
Part Number:Illustrations
Publisher:Addison-Wesley Professional
Studio:Addison-Wesley Professional
MPN:Illustrations
UPC:785342549256
EAN:9780321549259
Item Weight:2.65 pounds
Item Size:1.7 x 9.1 x 9.1 inches
Package Weight:2.6 pounds
Package Size:7 x 1.6 x 1.6 inches

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection by Addison-Wesley Professional

Buy Now:
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection

Brand: Addison-Wesley Professional
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$64.99
$48.17
You Save: 26%


Quantity:  

 


View More In Quality Control.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Addison-Wesley Professional, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


mpn: Illustrations, ean: 9780321502759, isbn: 0321502752,
When software development teams move to agile methods, experienced project managers often struggle—doubtful about the new approach and uncertain about their new roles and responsibilities. In this book, two long-time certified Project Management Pr...

mpn: 21945551, ean: 9780321336385, isbn: 9780321336385,
For any software developer who has spent days in “integration hell,” cobbling together myriad software components, Continuous Integration: Improving Software Quality and Reducing Risk illustrates how to transform integration from a necessary ev...



Privacy Policy / Terms of Service
© 2018 - emslinux.com. All Rights Reserved.