Available

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection

Christian Collberg

Jasvir Nagra

©2010 |Addison-Wesley Professional | Available