Programming Books C Java PHP Python Learn more Browse Programming Books
Surreptitious Software and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $64.99
  • Save: $43.05 (66%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: Dec 22, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Used: Good | Details
Sold by RentU
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Qty:1
  • List Price: $64.99
  • Save: $18.01 (28%)
Only 8 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $21.27
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection Paperback – August 3, 2009

ISBN-13: 978-0321549259 ISBN-10: 0321549252 Edition: 1st

Buy New
Price: $46.98
Rent
Price: $21.94
30 New from $46.98 22 Used from $43.98
Rent from Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$21.94
$46.98
$46.98 $43.98

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student




Frequently Bought Together

Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection + What Makes It Page?: The Windows 7 (x64) Virtual Memory Manager
Price for both: $69.48

Buy the selected items together

NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 792 pages
  • Publisher: Addison-Wesley Professional; 1 edition (August 3, 2009)
  • Language: English
  • ISBN-10: 0321549252
  • ISBN-13: 978-0321549259
  • Product Dimensions: 9.1 x 7.1 x 1.6 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #360,842 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Christian Collberg received a B.Sc. in computer science and numerical analysis and a Ph.D. in computer science from Lund University, Sweden. He is currently an associate professor in the department of computer science at the University of Arizona and has also worked at the University of Auckland, New Zealand, and the Chinese Academy of Sciences in Beijing. Professor Collberg is a leading researcher in the intellectual property protection of software, and also maintains an interest in compiler and programming language research. In his spare time he writes songs, sings, and plays guitar for The Zax and hopes one day to finish his Great Swedish Novel.

Jasvir Nagra received his B.Sc. in mathematics and computer science and a Ph.D. in computer science from the University of Auckland, New Zealand. He’s been a postdoctoral scholar on the RE-TRUST project at the University of Trento, where his focus is on applying obfuscation, tamperproofing, and watermarking techniques to protect the integrity of software executing on a remote untrusted platform. His research interests also include the design of programming languages and its impact on the security of applications. He’s currently with Google Inc., where he is building Caja, an open source, secure subset of JavaScript. In his spare time Jasvir dabbles with Lego and one day hopes to finish building his Turing machine made entirely out of Lego blocks.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5.0 out of 5 stars
5 star
4
4 star
0
3 star
0
2 star
0
1 star
0
See all 4 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

14 of 16 people found the following review helpful By calvinnme HALL OF FAMETOP 500 REVIEWERVINE VOICE on September 27, 2009
Format: Paperback
This book was very interesting to me. I really don't work in such a way that I would have a need to deploy my own software for money and therefore need to worry about hiding the details of my code, but it was an aspect of computer security I didn't know much about until I sat down with this book. The book is not about trying to keep people out of your computer networks, but it is about keeping unauthorized users from executing your code and about disabling the analysis of your code by those who might want to extract details about some algorithm for the purpose of copying it.

I thought that the algorithms involved were very well explained and code snippets were shown to illustrate key concepts. The author employs widely used languages such as PERL for his examples. Commercial products are mentioned when applicable. I really enjoyed the sections on steganography and watermarking - these sections contain the clearest descriptions of the key algorithms involved that I've seen. I had only seen this subject mentioned before in the context of information hiding inside of an image, and the author did a great job of applying it to the conditional hiding of software details.

I'd highly recommend this especially to anyone involved in securing software, but even if you are not it is a good exercise in "stretching your brain" on a timely computer science topic. The reader should already be an able programmer in a number of the more common languages (PERL, Java, C) and you should probably have a background in computer science equivalent to a four year degree in order to get the most from this book. The table of contents are not currently shown in the product information, so I include that next.

Chapter 1. What Is Surreptitious Software?
Section 1.1.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Marius Glasberg on April 22, 2014
Format: Kindle Edition Verified Purchase
Very good, maybe the best resource for protecting your own software releases.
A must read, with a good price!
Thank you!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 4 people found the following review helpful By Midwest Book Review on November 16, 2009
Format: Paperback
Christian Collberg's SURREPTITIOUS SOFTWARE packs in tips on security and tools for fighting software piracy and covers all the latest programs that both attackers and defenders use to analyze programs. From fingerprinting software to identify its author to tamper-proofing software with guards, strengthening content, and detecting code theft, this is a key acquisition for any serious software library, unparalleled in its content and coverage.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 9 people found the following review helpful By Gary McGraw on July 29, 2009
Format: Paperback
This book is part of Addison-Wesley's software security series (which I edit). Most of the books in the series are about how to build more secure software. By contrast, this book is about how to protect software.

There are many resaons to protect software with watermarking, obfuscation, and tamperproofing. Perhaps your product needs protection from piracy (like a game, a book, or music). Perhaps your product involves top secret military ideas and may be captured by the enemy (like a predator drone shot down in Afghanistan). Whatever your reason for software protection might be, this book is the go to guide for protecting software.

Christian Collberg has long been an important intellectual leader in software protection. This book will serve as the most important reference in a blossoming new field.

gem
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search

What Other Items Do Customers Buy After Viewing This Item?