LEADER 02976nam a2200421Ii 4500 001 991003261039707536 006 m d 007 cr cn||||||||| 008 070806s2005 maua es 001 0 eng d 020 $a9781932266986 020 $a1932266984 035 $ab13656843-39ule_inst 037 $a110570:110619$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a364.168$222 100 1 $aCraig, Paul.$0515828 245 10$aSoftware piracy exposed$h[electronic resource] /$cPaul Craig, Ron Honick ; Mark Burnett, technical editor. 260 $aRockland, MA :$bSyngress,$cc2005. 300 $axvi, 310 p. :$bill. ;$c23 cm. 500 $aIncludes index. 505 0 $aINTRODUCTION; WHY SOFTWARE IS PIRATED; TYPES OF SOFTWARE; TYPES OF CRACKS; HAZARDS, PRECAUTIONS, & SOLUTIONS; PIRATED SOFTWARE SOURCES; CRACKING ILLUSTRATED; USEFUL TOOLS; THE SOFTWARE COMPANIES FIGHT BACK; SUMMARY & CONCLUSION. 520 $aThis book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. * This book is about software piracy--what it is and how it's done * This is the first book ever to describe how software is actually stolen and traded over the internet * Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aAcquisition of computer software. 650 0$aComputer crimes. 650 0$aComputer security. 655 7$aElectronic books.$2local 700 1 $aHonick, Ron.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739094 700 1 $aBurnett, Mark$q(Mark M.) 776 1 $cOriginal$z1932266984$z9781932266986$w(OCoLC)57355454 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781932266986$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656843$b24-02-22$c24-01-08 912 $a991003261039707536 994 $aC0$bTEF 996 $aSoftware piracy exposed$91464053 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0