Surreptitious Software

Surreptitious Software
Author: Jasvir Nagra
Publisher: Pearson Education
Total Pages: 939
Release: 2009-07-24
Genre: Computers
ISBN: 0132702037

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur. Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques. Coverage includes Mastering techniques that both attackers and defenders use to analyze programs Using code obfuscation to make software harder to analyze and understand Fingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and data Strengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithms Using hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed system Understanding the theoretical limits of code obfuscation

Software Protection

Software Protection
Author: G. Gervaise Davis
Publisher: Van Nostrand Reinhold Company
Total Pages: 408
Release: 1985
Genre: Law
ISBN:

Artificial Intelligence and Intellectual Property

Artificial Intelligence and Intellectual Property
Author: Reto Hilty
Publisher: Oxford University Press, USA
Total Pages: 465
Release: 2021-02-25
Genre: Law
ISBN: 0198870949

This edited volume provides a broad and comprehensive picture of the intersection between Artificial Intelligence technology and Intellectual Property law, covering business and the basics of AI, the interactions between AI and patent law, copyright law, and IP administration, and the legal aspects of software and data.

PC Computer Security & Backup Guide

PC Computer Security & Backup Guide
Author: Jon Albert
Publisher:
Total Pages: 24
Release: 2020-01-18
Genre:
ISBN: 9781794882386

A detailed guide all about PC security and backups This guide will help you how to protect your computer from viruses, stay safe online and free internet online security software Based on easy hacks this book will teach you about: - Antivirus malware firewall backup - zero-cost software download - Microsoft security essentials - Avast free software protection - Firewall software - Spyware and Adware - How to use pop-up blockers - Zero-cost back-up alternatives - Web based storage - Recovery software If you want to protect your computer from malware, then this book is for you. Scroll to the top of the page and click add to cart to purchase instantly Disclaimer: This author and or rights owner(s) make no claims, promises, or guarantees about the accuracy, completeness, or adequacy of the contents of this book, and expressly disclaims liability for errors and omissions in the contents within. This product is for reference use only.

How to Break Software Security

How to Break Software Security
Author: James A. Whittaker
Publisher: Addison-Wesley
Total Pages: 185
Release: 2004
Genre: Computers
ISBN: 9780321194336

Learn how to destroy security bugs in your software from a tester's point-of-view. It focuses your security test on the common vulnerabilities--ther user interface, software dependencies, design, process and memory. (Midwest)

Software and Intellectual Property Protection

Software and Intellectual Property Protection
Author: Bernard A. Galler
Publisher: Praeger
Total Pages: 230
Release: 1995-05-23
Genre: Business & Economics
ISBN:

How has the legal system used its traditional body of copyright and patent law to protect rights in computer software? The last 15 years have changed the entire landscape with regard to the creation and protection of software as intellectual property. Written by a computer expert with extensive participation in some of the most important software trials of the period, this book invites you to think critically about significant software issues and learn about the legal pitfalls surrounding software development in the industry today. The book is organized around various legal issues raised by both plaintiffs and defendants in copyright litigation, and the problems of the U.S. Patent & Trademark Office in dealing with the rapid proliferation of applications for software-related patents. The author explains important terms and concepts in software litigation such as infringement, substantial similarity, reverse engineering, the merger defense, and look and feel. A succinct, readable survey for computer professionals, nonlegal academics, and lawyers who need a fast summary of the critical issues and cases in software and intellectual property matters.