Surreptitious Software : Obfuscation, Watermarking, and Tamperproofing for Software Protection (Paperback)

Customer Reviews   Write a Review

Be the first to review this item and earn 25 Rakuten Super Points™

Product Overview

?This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ?must have? for every researcher, student, and practicing professional in software protection.?
    ?Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University

Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering

The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property.Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance  penalty they incur.

Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.

Coverage includes
  • Mastering techniques that both attackers and defenders use to analyze programs
  • Using code obfuscation to make software harder to analyze and understand
  • Fingerprinting software to identify its author and to trace software pirates
  • Tamperproofing software using guards that detect and respond to illegal modifications of code and data
  • Strengthening content protection through dynamic watermarking and dynamic obfuscation
  • Detecting code theft via software similarity analysis and birthmarking algorithms
  • Using hardware techniques to defend software and media against piracy and tampering
  • Detecting software tampering in distributed system
  • Understanding the theoretical limits of code obfuscation

Specifications

Publisher Addison-Wesley Professional
Mfg Part# 9780321549259
SKU 210929722
Format Paperback
ISBN10 0321549252
Release Date 7/3/2009
Product Attributes
eBooks Kobo
Book Format Paperback
Number of Pages 0748
Publisher Addison-Wesley Professional
loading
$172.42 + $5.98 shipping
Rakuten Super Points Earn 173 ($1.73) Rakuten Super Points™
What are Rakuten Super Points™?
Get rewarded when you shop! Earn 1 point per dollar spent. That's like getting cash back on every purchase. Easy to see matured points in checkout. Use points just like cash.
Learn More
Get this item for
(price with shipping)
(redeem points)
Format: Paperback
Condition: Used-Good
In Stock. Usually Ships in 1 to 2 business days
Please select an option to buy
Add to Cart

What is a Marketplace and Shop Owner?
  • Our marketplace is a platform where approved third-party retailers (Shop Owners) can sell their products
  • Items are sold and shipped by Shop Owners
  • Your credit card and personal information remain secure; Rakuten.com meets all PCI Security Standards.
  • Purchases can only be returned to the Shop Owner
  • All purchases receive Rakuten Super Points™
ADVERTISEMENT
Promotions & Offers (1)
  •  custom promo
    5% Back* Sitewide with Promo Code Rewardme *See page for details
Buy From Other Sellers (1)
kobo
  • Take your library with you wherever you go
  • Use the device you want to use… smartphone, desktop and many of today’s most popular eReaders

WHY KOBO?

We love the Kobo eReading service… and we know you will too. We’ve partnered with them to bring you the most flexible, enjoyable eReading experience in the U.S.

SHOPPING ON KOBO

You’ll be asked to sign in or create a new account with Kobo. Once you do, you’ll immediately get access to millions of titles and be ready to start eReading. Anytime. Anyplace.

continue to kobo
ADVERTISEMENT
ADVERTISEMENT