by
Collberg, Christian.
Format:
Electronic Resources
Excerpt:
Surreptitious software : obfuscation, watermarking, and tamperproofing for software protection /
by
Miller, Drew.
Format:
Electronic Resources
Excerpt:
Black Hat Physical Device Security : Exploiting Hardware and Software. Miller, Drew.
View Other Search Results
by
C̆ervĕn, Pavol.
Format:
Electronic Resources
Excerpt:
Crackproof your software the best ways to protect your software against crackers / C̆ervĕn, Pavol.
by
Rice, William E. Perry. Randall W.
Format:
Electronic Resources
Excerpt:
Surviving the Top Ten Challenges of Software Testing : a People-Oriented Approach / Rice, William E
by
Drabick, Rodger, author.
Format:
Electronic Resources
Excerpt:
Best Practices for the Formal Software Testing Process : a Menu of Testing Tasks / Drabick, Rodger
by
Okada, Mitsu. editor.
Format:
Electronic Resources
Excerpt:
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues 11th Asian Computing
by
Cappelli, Dawn.
Format:
Electronic Resources
Excerpt:
The SEI series in software engineering
by
Long, Keping. editor.
Format:
Electronic Resources
Excerpt:
Software engineering.
by
Carrasco Molina, Manuel, author.
Format:
Electronic Resources
Excerpt:
Application program interfaces (Computer software)
by
Bihis, Charles, author.
Format:
Electronic Resources
Excerpt:
Application program interfaces (Computer software) -- Security measures.
by
Siriwardena, Prabath.
Format:
Electronic Resources
Excerpt:
Application software -- Security measures.
by
Soares, Sunil.
Format:
Electronic Resources
Excerpt:
IBM software.
Limit Search Results
Narrowed by: