02812nam 2200637Ia 450 991045048800332120200520144314.01-281-03585-897866110358531-4237-5423-90-08-048973-7(CKB)1000000000246666(EBL)254840(OCoLC)181421132(SSID)ssj0000248148(PQKBManifestationID)11208710(PQKBTitleCode)TC0000248148(PQKBWorkID)10200893(PQKB)10676945(MiAaPQ)EBC254840(CaSebORM)9781932266986(Au-PeEL)EBL254840(CaPaEBR)ebr10110282(CaONFJC)MIL103585(OCoLC)935230464(EXLCZ)99100000000024666620041210d2005 ky 0engur|n|---|||||txtccrSoftware piracy exposed[electronic resource] /Ron Honick1st editionRockland, Mass. Syngress20051 online resource (328 p.)Description based upon print version of record.1-932266-98-4 Ch. 1. Inside software piracy -- Ch. 2. The history of software piracy -- Ch. 3. The suppliers -- Ch. 4. Crackers -- Ch. 5. The release -- Ch. 6. Sites -- Ch. 7. The distribution chain -- Ch. 8. The piracy scene -- Ch. 9. Piracy and the law -- Ch. 10. The future of piracy -- Ch. 11. Closing notes -- App. A. Pirating software : attitudes and reasons -- App. B. Why software is pirated -- App. C. Hazards, solutions, and tools -- App. D. Fighting back.This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book desAcquisition of computer softwareComputer crimesComputer securityElectronic books.Acquisition of computer software.Computer crimes.Computer security.364.168Honick Ron739094MiAaPQMiAaPQMiAaPQBOOK9910450488003321Software piracy exposed2486705UNINA