1. Crackproof your software : protect your software against crackers

by Cerven, Pavol.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: No Starch Press, 2002Availability: Items available for loan: [Call number: 005.8 CER] (2).
2. Software IP detective's handbook : measurement, comparison, and infringement detection

by Zeidman, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 346.048 ZEI] (1).
3. Identifying malicious code through reverse engineering

by Singh, Baibhav | Singh, Abhishek.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.84 SIN] (1).
4. Software similarity and classification

by Cesare, Silvio | Xiang, Yang.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: London: Springer, 2012Availability: Items available for loan: [Call number: 005.8 CES] (1).
5. Foundations of security : what every programmer needs to know

by Daswani, Neil | Kern, Christoph | Kesavan, Anita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berkeley: Apress, 2007Availability: Items available for loan: [Call number: 005.8 DAS] (5).
6. Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999 Proceedings

by Pfitzmann, Andreas.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2000Availability: Items available for loan: [Call number: 004 PFI] (1).

Powered by Koha