Book,

Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection.

, and .
Addison-Wesley Software Security Series Addison-Wesley, (2010)

Meta data

Tags

Users

  • @dblp

Comments and Reviews