Surreptitious software : (Record no. 4183)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100316s2010 bjua b 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009015520
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321549252 (pbk. : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321549259 (pbk. : alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u5179
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Collberg, Christian.
9 (RLIN) 10342
245 10 - TITLE STATEMENT
Title Surreptitious software :
Remainder of title obfuscation, watermarking, and tamperproofing for software protection /
Statement of responsibility, etc. Christian Collberg, Jasvir Nagra.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. c2010
300 ## - PHYSICAL DESCRIPTION
Extent xxvii, 748 p. :
Other physical details ill. ;
Dimensions 23 cm.
490 0# - SERIES STATEMENT
Series statement Addison-Wesley software security series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note What is surreptitious software? -- Methods of attack and defense -- Program analysis -- Code obfuscation -- Obfuscation theory -- Dynamic obfuscation -- Software tamperproofing -- Software watermarking -- Dynamic watermarking -- Software similarity analysis -- Hardware for protecting software.
520 ## - SUMMARY, ETC.
Summary, etc. The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur. Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 10343
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 10344
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 10345
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Copyright and electronic data processing
Geographic subdivision United States.
9 (RLIN) 9397
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nagra, Jasvir.
9 (RLIN) 10346
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 AHRA-P   005.8 / CO.S 2010 007031 11/24/2019 1 11/24/2019 Books