Crackproof your software : the best ways to protect your software against crackers / / Pavol Cerven |
Autore | Cerven Pavol |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2002 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 005.8 |
Soggetto topico |
Software protection
Computer security Data protection Computer crimes |
ISBN | 1-59327-022-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CONTENTS; Cracking Tools; The Basic Types Of Software Protection; Cd Protection Tricks; Program Compression And Encoding: Freeware And Shareware; Commercial Software Protection Programs; Anti-debugging, Anti-disassembling, And Other Tricks For Protecting Against Softice And Trw; Protecting Against Breakpoints, Tracers, And Debuggers; Other Protection Tricks; Important Structures In Windows; Suggestions For Better Software Protection; Glossary; Index |
Record Nr. | UNINA-9910827469403321 |
Cerven Pavol | ||
San Francisco, : No Starch Press, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crackproof your software [[electronic resource] ] : the best ways to protect your software against crackers / / Pavol C̆ervĕn |
Autore | C̆ervĕn Pavol |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2002 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 005.8 |
Soggetto topico |
Software protection
Computer security Data protection Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN | 1-59327-022-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CONTENTS; Cracking Tools; The Basic Types Of Software Protection; Cd Protection Tricks; Program Compression And Encoding: Freeware And Shareware; Commercial Software Protection Programs; Anti-debugging, Anti-disassembling, And Other Tricks For Protecting Against Softice And Trw; Protecting Against Breakpoints, Tracers, And Debuggers; Other Protection Tricks; Important Structures In Windows; Suggestions For Better Software Protection; Glossary; Index |
Record Nr. | UNINA-9910456338803321 |
C̆ervĕn Pavol | ||
San Francisco, : No Starch Press, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crackproof your software [[electronic resource] ] : the best ways to protect your software against crackers / / Pavol C̆ervĕn |
Autore | C̆ervĕn Pavol |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2002 |
Descrizione fisica | 1 online resource (270 p.) |
Disciplina | 005.8 |
Soggetto topico |
Software protection
Computer security Data protection Computer crimes |
ISBN | 1-59327-022-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CONTENTS; Cracking Tools; The Basic Types Of Software Protection; Cd Protection Tricks; Program Compression And Encoding: Freeware And Shareware; Commercial Software Protection Programs; Anti-debugging, Anti-disassembling, And Other Tricks For Protecting Against Softice And Trw; Protecting Against Breakpoints, Tracers, And Debuggers; Other Protection Tricks; Important Structures In Windows; Suggestions For Better Software Protection; Glossary; Index |
Record Nr. | UNINA-9910780126903321 |
C̆ervĕn Pavol | ||
San Francisco, : No Starch Press, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Defense acquisitions [[electronic resource] ] : knowledge of software suppliers needed to manage risks : report to congressional requesters |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. General Accounting Office, , [2004] |
Soggetto topico |
Software protection
Cyberterrorism - Prevention - Government policy - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Defense acquisitions |
Record Nr. | UNINA-9910692543603321 |
[Washington, D.C.] : , : U.S. General Accounting Office, , [2004] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / / Reihaneh Safavi-Naini, Moti Yung (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, : Springer, 2006 |
Descrizione fisica | 1 online resource (XII, 360 p.) |
Disciplina | 005.82 |
Altri autori (Persone) |
Safavi-NainiReihanah
YungMoti |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Copyright and electronic data processing
Data protection Internet industry - Security measures Piracy (Copyright) - Prevention Intellectual property Software protection |
ISBN | 3-540-35999-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Assurance and Authentication Issues -- A Novel Framework for Multiple Creatorship Protection of Digital Movies -- TIVA: Trusted Integrity Verification Architecture -- Legal and Related Issues -- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? -- Downloading vs Purchase: Music Industry vs Consumers -- Digital Rights Management: Merging Contract, Copyright and Criminal Law -- Expressing Rights and Management -- User-Attributed Rights in DRM -- AVS-REL—A New Right Expression Language -- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights -- Watermarking -- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks -- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream -- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform -- Software Issues -- Software Tamper Resistance Through Dynamic Program Monitoring -- Call Tree Transformation for Program Obfuscation and Copy Protection -- Algorithms to Watermark Software Through Register Allocation -- Fingerprinting and Image Authentication -- An Efficient Fingerprinting Scheme with Secret Sharing -- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology -- Security Weaknesses of Certain Broadcast Encryption Schemes -- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security -- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys -- A Vector Approach to Cryptography Implementation -- P2P Issues -- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network -- Design of a Secure Digital Contents Delivery System in P2P Networks -- Implementations and Architectures -- Real-Time Implementation of Broadcast Switching System Using Audio Watermark -- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing -- A DRM System Supporting What You See Is What You Pay. |
Altri titoli varianti | DRMTICS 2005 |
Record Nr. | UNINA-9910484944103321 |
Berlin, : Springer, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential SourceSafe [[electronic resource] /] / Ted Roche |
Autore | Roche Ted |
Pubbl/distr/stampa | Whitefish Bay, Wis., : Hentzenwerke Publishing, c2001 |
Descrizione fisica | 1 online resource (245 p.) |
Disciplina | 005.3 |
Collana | The Virginia Civil War battles and leaders series The final bivouac |
Soggetto topico |
Computer software - Development
Software protection Source code (Computer science) |
Soggetto genere / forma | Electronic books. |
ISBN |
0-930919-50-5
1-280-54413-9 1-930919-14-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""BookCover""; ""Our Contract with You, The Reader""; ""Table of Contents""; ""Acknowledgements""; ""About the Author""; ""How to Download the Files""; ""Introduction""; ""Versions covered""; ""The purpose of this book""; ""The organization of this book""; ""Why VFP?""; ""The future of SourceSafe""; ""Feedback, questions, compliments, comments and complaints""; ""Chapter 1 Visual SourceSafe Installation""; ""How many installs do I do?""; ""Installing Visual SourceSafe as a stand-alone product""; ""Installing VSS as part of the Visual Studio install""
""Installing VSS as part of a Microsoft Office Developer install""""What files get installed where?""; ""Update SourceSafe with service packs""; ""VSS is installed�now what?""; ""Creating user accounts""; ""Configuring the database for integration""; ""Chapter 2 SourceSafe in Theory and Practice""; ""The theory: Learning to climb the tree""; ""Tutorial: Climbing the tree""; ""The reality: Swinging through the branches""; ""Multiple checkouts and the Dreaded Visual Merge form""; ""Is the hassle worth it?""; ""The Explorer interface""; ""Toolbar""; ""Menu""; ""Project tree view"" ""File pane""""Results pane""; ""Status bar""; ""Drag and drop""; ""Reports""; ""Dialog by dialog""; ""The File menu""; ""Open Database""; ""Add Files""; ""Create Project""; ""Delete""; ""Rename""; ""Properties""; ""Set Working Folder""; ""Create Shortcut""; ""Label""; ""Move""; ""The Edit menu""; ""View File and Edit File""; ""Select""; ""Select All""; ""Invert Selection""; ""The View menu""; ""Sort (Name, Type, User, Date, Checkout Folder)""; ""Search""; ""Wildcard Search""; ""Status Search""; ""Cancel Search""; ""Refresh File List""; ""The SourceSafe menu""; ""Get Latest Version"" ""Check Out""""Check In""; ""Undo Check Out""; ""Share""; ""Branch""; ""Merge Branches""; ""The Tools menu""; ""Show History""; ""History form""; ""Show Differences""; ""Differences form""; ""Find in Files�""; ""Files Report""; ""SourceSafe Explorer�s Tools | Options dialog""; ""Font""; ""Customize Toolbar""; ""Change Password""; ""The Web menu""; ""Deploy""; ""Check Hyperlinks""; ""Create Site Map""; ""Chapter 3 Configuring Applications""; ""The SCCAPI mechanism""; ""Standardize on one configuration for the team""; ""Configuring Visual FoxPro""; ""Configuring Visual Basic"" ""SourceSafe common Advanced options""""Configuring InterDev and Visual J++""; ""Configuring Visual InterDev for Web projects""; ""Configuring C++""; ""Configuring Microsoft Office""; ""Configuring FrontPage""; ""Configuring InterDev and SQL Server for data projects""; ""Chapter 4 Visual SourceSafe and Visual Studio Integration""; ""Should you use integration?""; ""How it works: The big picture""; ""Creating a new project""; ""Joining an existing project""; ""Maintaining existing code""; ""Adding new code to a project""; ""Bringing an existing project into source code control"" ""The devil�s in the details"" |
Record Nr. | UNINA-9910455248903321 |
Roche Ted | ||
Whitefish Bay, Wis., : Hentzenwerke Publishing, c2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential SourceSafe [[electronic resource] /] / Ted Roche |
Autore | Roche Ted |
Pubbl/distr/stampa | Whitefish Bay, Wis., : Hentzenwerke Publishing, c2001 |
Descrizione fisica | 1 online resource (245 p.) |
Disciplina | 005.3 |
Collana | The Virginia Civil War battles and leaders series The final bivouac |
Soggetto topico |
Computer software - Development
Software protection Source code (Computer science) |
ISBN |
0-930919-50-5
1-280-54413-9 1-930919-14-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""BookCover""; ""Our Contract with You, The Reader""; ""Table of Contents""; ""Acknowledgements""; ""About the Author""; ""How to Download the Files""; ""Introduction""; ""Versions covered""; ""The purpose of this book""; ""The organization of this book""; ""Why VFP?""; ""The future of SourceSafe""; ""Feedback, questions, compliments, comments and complaints""; ""Chapter 1 Visual SourceSafe Installation""; ""How many installs do I do?""; ""Installing Visual SourceSafe as a stand-alone product""; ""Installing VSS as part of the Visual Studio install""
""Installing VSS as part of a Microsoft Office Developer install""""What files get installed where?""; ""Update SourceSafe with service packs""; ""VSS is installed�now what?""; ""Creating user accounts""; ""Configuring the database for integration""; ""Chapter 2 SourceSafe in Theory and Practice""; ""The theory: Learning to climb the tree""; ""Tutorial: Climbing the tree""; ""The reality: Swinging through the branches""; ""Multiple checkouts and the Dreaded Visual Merge form""; ""Is the hassle worth it?""; ""The Explorer interface""; ""Toolbar""; ""Menu""; ""Project tree view"" ""File pane""""Results pane""; ""Status bar""; ""Drag and drop""; ""Reports""; ""Dialog by dialog""; ""The File menu""; ""Open Database""; ""Add Files""; ""Create Project""; ""Delete""; ""Rename""; ""Properties""; ""Set Working Folder""; ""Create Shortcut""; ""Label""; ""Move""; ""The Edit menu""; ""View File and Edit File""; ""Select""; ""Select All""; ""Invert Selection""; ""The View menu""; ""Sort (Name, Type, User, Date, Checkout Folder)""; ""Search""; ""Wildcard Search""; ""Status Search""; ""Cancel Search""; ""Refresh File List""; ""The SourceSafe menu""; ""Get Latest Version"" ""Check Out""""Check In""; ""Undo Check Out""; ""Share""; ""Branch""; ""Merge Branches""; ""The Tools menu""; ""Show History""; ""History form""; ""Show Differences""; ""Differences form""; ""Find in Files�""; ""Files Report""; ""SourceSafe Explorer�s Tools | Options dialog""; ""Font""; ""Customize Toolbar""; ""Change Password""; ""The Web menu""; ""Deploy""; ""Check Hyperlinks""; ""Create Site Map""; ""Chapter 3 Configuring Applications""; ""The SCCAPI mechanism""; ""Standardize on one configuration for the team""; ""Configuring Visual FoxPro""; ""Configuring Visual Basic"" ""SourceSafe common Advanced options""""Configuring InterDev and Visual J++""; ""Configuring Visual InterDev for Web projects""; ""Configuring C++""; ""Configuring Microsoft Office""; ""Configuring FrontPage""; ""Configuring InterDev and SQL Server for data projects""; ""Chapter 4 Visual SourceSafe and Visual Studio Integration""; ""Should you use integration?""; ""How it works: The big picture""; ""Creating a new project""; ""Joining an existing project""; ""Maintaining existing code""; ""Adding new code to a project""; ""Bringing an existing project into source code control"" ""The devil�s in the details"" |
Record Nr. | UNINA-9910779967403321 |
Roche Ted | ||
Whitefish Bay, Wis., : Hentzenwerke Publishing, c2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Essential SourceSafe / / Ted Roche |
Autore | Roche Ted |
Pubbl/distr/stampa | Whitefish Bay, Wis., : Hentzenwerke Publishing, c2001 |
Descrizione fisica | 1 online resource (245 p.) |
Disciplina | 005.3 |
Collana | The Virginia Civil War battles and leaders series The final bivouac |
Soggetto topico |
Computer software - Development
Software protection Source code (Computer science) |
ISBN |
0-930919-50-5
1-280-54413-9 1-930919-14-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""BookCover""; ""Our Contract with You, The Reader""; ""Table of Contents""; ""Acknowledgements""; ""About the Author""; ""How to Download the Files""; ""Introduction""; ""Versions covered""; ""The purpose of this book""; ""The organization of this book""; ""Why VFP?""; ""The future of SourceSafe""; ""Feedback, questions, compliments, comments and complaints""; ""Chapter 1 Visual SourceSafe Installation""; ""How many installs do I do?""; ""Installing Visual SourceSafe as a stand-alone product""; ""Installing VSS as part of the Visual Studio install""
""Installing VSS as part of a Microsoft Office Developer install""""What files get installed where?""; ""Update SourceSafe with service packs""; ""VSS is installed�now what?""; ""Creating user accounts""; ""Configuring the database for integration""; ""Chapter 2 SourceSafe in Theory and Practice""; ""The theory: Learning to climb the tree""; ""Tutorial: Climbing the tree""; ""The reality: Swinging through the branches""; ""Multiple checkouts and the Dreaded Visual Merge form""; ""Is the hassle worth it?""; ""The Explorer interface""; ""Toolbar""; ""Menu""; ""Project tree view"" ""File pane""""Results pane""; ""Status bar""; ""Drag and drop""; ""Reports""; ""Dialog by dialog""; ""The File menu""; ""Open Database""; ""Add Files""; ""Create Project""; ""Delete""; ""Rename""; ""Properties""; ""Set Working Folder""; ""Create Shortcut""; ""Label""; ""Move""; ""The Edit menu""; ""View File and Edit File""; ""Select""; ""Select All""; ""Invert Selection""; ""The View menu""; ""Sort (Name, Type, User, Date, Checkout Folder)""; ""Search""; ""Wildcard Search""; ""Status Search""; ""Cancel Search""; ""Refresh File List""; ""The SourceSafe menu""; ""Get Latest Version"" ""Check Out""""Check In""; ""Undo Check Out""; ""Share""; ""Branch""; ""Merge Branches""; ""The Tools menu""; ""Show History""; ""History form""; ""Show Differences""; ""Differences form""; ""Find in Files�""; ""Files Report""; ""SourceSafe Explorer�s Tools | Options dialog""; ""Font""; ""Customize Toolbar""; ""Change Password""; ""The Web menu""; ""Deploy""; ""Check Hyperlinks""; ""Create Site Map""; ""Chapter 3 Configuring Applications""; ""The SCCAPI mechanism""; ""Standardize on one configuration for the team""; ""Configuring Visual FoxPro""; ""Configuring Visual Basic"" ""SourceSafe common Advanced options""""Configuring InterDev and Visual J++""; ""Configuring Visual InterDev for Web projects""; ""Configuring C++""; ""Configuring Microsoft Office""; ""Configuring FrontPage""; ""Configuring InterDev and SQL Server for data projects""; ""Chapter 4 Visual SourceSafe and Visual Studio Integration""; ""Should you use integration?""; ""How it works: The big picture""; ""Creating a new project""; ""Joining an existing project""; ""Maintaining existing code""; ""Adding new code to a project""; ""Bringing an existing project into source code control"" ""The devil�s in the details"" |
Altri titoli varianti | Essential Source Safe |
Record Nr. | UNINA-9910812181803321 |
Roche Ted | ||
Whitefish Bay, Wis., : Hentzenwerke Publishing, c2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 1st International Workshop on Software Protection / / Paolo Falcarin |
Autore | Falcarin Paolo |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers (IEEE) Press, , 2015 |
Descrizione fisica | 1 online resource (77 pages) : illustrations |
Disciplina | 005 |
Soggetto topico |
Software protection
Electronic data processing Computer science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910376472603321 |
Falcarin Paolo | ||
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers (IEEE) Press, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2016 ACM Workshop on Software Protection / / general chair, Brecht Wyseur ; program chair, Bjorn De Sutter |
Pubbl/distr/stampa | New York : , : ACM, , 2016 |
Descrizione fisica | 1 online resource (94 pages) |
Disciplina | 005.8 |
Soggetto topico | Software protection |
ISBN | 1-4503-4576-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Proceedings of the 2016 Association for Computing Machinery Workshop on Software Protection |
Record Nr. | UNINA-9910376421403321 |
New York : , : ACM, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|