Buch,

Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection.

, und .
Addison-Wesley Software Security Series Addison-Wesley, (2010)

Metadaten

Tags

Nutzer

  • @dblp

Kommentare und Rezensionen