Surreptitious Software: obfuscation, watermarking, and tamperproofing for software protection by Christian Collberg
Material type:
Contents:
<p>Table of Contents:</p>
<p><span sty
Item type | Current library | Collection | Call number | Vol info | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
LRC_JUIT Computer Science & Engineering | TEXTBOOK SECTION | 005.8 COL (Browse shelf (Opens below)) | Copy 1 | Available | 030365 |
Total holds: 0
<p>Table of Contents:</p>
<p><span sty
There are no comments on this title.