Buy It from Pearson Education (InformIT)
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.'Without protection, software is vulnerable to reverse engineering, piracy, and tampering. Every software vendor should be aware of this threat and make use of techniques such as those described inSurreptitious Software to protect their valuable intellectual property.Other products from Pearson Education (InformIT)