Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Software protection. Computer software“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Software protection. Computer software" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Software protection. Computer software"
Aubyn, John St. „Computer-software protection“. Learned Publishing 5, Nr. 2 (01.01.1992): 103–4. http://dx.doi.org/10.1002/leap/50035.
Der volle Inhalt der QuelleMenell, Peter S. „Tailoring Legal Protection for Computer Software“. Stanford Law Review 39, Nr. 6 (Juli 1987): 1329. http://dx.doi.org/10.2307/1228849.
Der volle Inhalt der QuelleCifuentes, C. „Australian Recommendations on Computer Software Protection“. Computer Journal 39, Nr. 7 (01.07.1996): 566–76. http://dx.doi.org/10.1093/comjnl/39.7.566.
Der volle Inhalt der QuelleGreaves, D. W. „Computer software — Protection/liability/law/forms“. Computer Law & Security Review 4, Nr. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.
Der volle Inhalt der QuelleAssia, Naomi. „Software protection in Israel“. International Review of Law, Computers & Technology 7, Nr. 1 (Januar 1993): 221–30. http://dx.doi.org/10.1080/13600869.1993.9966364.
Der volle Inhalt der QuelleTan, Hua Shan, und Yang Yang. „A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption“. Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.
Der volle Inhalt der QuelleZhao, Chun Yang, und Wei Ping Wang. „USB Storage Device Protection Software“. Advanced Materials Research 722 (Juli 2013): 244–49. http://dx.doi.org/10.4028/www.scientific.net/amr.722.244.
Der volle Inhalt der QuelleSamuels, Linda B., und Jeffrey M. Samuels. „New Developments in Copyright Protection of Computer Software“. International Journal of Legal Information 15, Nr. 5-6 (Dezember 1987): 195–200. http://dx.doi.org/10.1017/s0731126500021090.
Der volle Inhalt der QuelleRoarke, Robert F., und Catherine Szenczy. „Computer software and copyright protection: Health care implications“. Journal of Healthcare Risk Management 12, Nr. 4 (Juni 1992): 5–11. http://dx.doi.org/10.1002/jhrm.5600120404.
Der volle Inhalt der QuelleShalgi, Moshe. „Copyright in Software and Data“. Israel Law Review 21, Nr. 1 (1986): 15–22. http://dx.doi.org/10.1017/s0021223700008852.
Der volle Inhalt der QuelleDissertationen zum Thema "Software protection. Computer software"
Rush, Andrea Friedman. „Legal protection of computer software in Canada“. Thesis, University of Ottawa (Canada), 1985. http://hdl.handle.net/10393/4750.
Der volle Inhalt der QuelleFragkos, Georgios. „An event-trace language for software decoys“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.
Der volle Inhalt der QuelleThesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
Volynkin, Alexander S. „Advanced methods for detection of malicious software“. Diss., Online access via UMI:, 2007.
Den vollen Inhalt der Quelle findenGarren, Scott L. (Scott Leland). „Copyright protection of computer software : history, politics, and technology“. Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/28007.
Der volle Inhalt der QuelleOstrovsky, Rafail. „Software protection and simulation on oblivious RAMs“. Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/103684.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 71-72).
by Rafail M. Ostrovsky.
Ph.D.
Råman, Jari. „Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /“. Rovaniemi : University of Lapland, 2006. http://www.loc.gov/catdir/toc/fy0803/2006499062.html.
Der volle Inhalt der QuelleEverett, Christopher E. „Fundamentals of software patent protection at a university“. Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-01062003-174536.
Der volle Inhalt der QuelleLai, Stanley. „The copyright protection of computer software in the United Kingdom“. Thesis, University of Cambridge, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413087.
Der volle Inhalt der QuelleWoo, Yan. „A dynamic integrity verification scheme for tamper-resistance software“. Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B34740478.
Der volle Inhalt der QuelleWoo, Yan, und 胡昕. „A dynamic integrity verification scheme for tamper-resistancesoftware“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B34740478.
Der volle Inhalt der QuelleBücher zum Thema "Software protection. Computer software"
Sherman, Cary H. Computer software protection law. Washington, D.C: Bureau of National Affairs, 1989.
Den vollen Inhalt der Quelle findenI, Bainbridge David, Hrsg. Legal protection of computer software. 5. Aufl. Heath, West Sussex: Tottel Publishing, 2008.
Den vollen Inhalt der Quelle findenRobertson, Ranald. Legal protection of computer software. London: Longman, 1990.
Den vollen Inhalt der Quelle findenKutten, L. J. Computer software: Protection, liability, law, forms. Deerfield, IL: Clark Boardman Callaghan, 1987.
Den vollen Inhalt der Quelle findenKutten, L. J. Computer software: Protection, liability, law, forms. Saint Paul, MN: Thomson/West, 2003.
Den vollen Inhalt der Quelle findenSamuelson, Pamela. Intellectual property protection for software. Pittsburgh, Pa: Carnegie Mellon University, Software Engineering Institute, 1989.
Den vollen Inhalt der Quelle findenC̆ervĕn, Pavol. Crackproof your software: The best ways to protect your software against crackers. San Francisco: No Starch Press, 2002.
Den vollen Inhalt der Quelle findenThe software developer's and marketer's legal companion: Protect your software and your software business. Reading, Mass: Addison-Wesley Pub. Co., 1993.
Den vollen Inhalt der Quelle findenSoftware patents. 2. Aufl. Gaithersburg: Aspen Law & Business, 2000.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Software protection. Computer software"
van Oorschot, Paul C. „Revisiting Software Protection“. In Lecture Notes in Computer Science, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_1.
Der volle Inhalt der QuelleLane, V. P. „Protection of Proprietary Software“. In Security of Computer Based Information Systems, 144–54. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_10.
Der volle Inhalt der QuellePieprzyk, Josef. „Fingerprints for Copyright Software Protection“. In Lecture Notes in Computer Science, 178–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x_15.
Der volle Inhalt der QuelleJeges, Ernő, Zoltán Hornák, Gergely Eberhardt und Zoltán Nagy. „Watermarking Software to Signal Copy Protection“. In Communications in Computer and Information Science, 408–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9_36.
Der volle Inhalt der QuelleFeigenbaum, Joan, Mark Liberman und Rebecca Wright. „Cryptographic protection of databases and software“. In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 1. Providence, Rhode Island: American Mathematical Society, 1991. http://dx.doi.org/10.1090/dimacs/002/10.
Der volle Inhalt der QuellePage, B. „Environmental Informatics Towards a new Discipline in Applied Computer Science for Environmental Protection and Research“. In Environmental Software Systems, 3–22. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34951-0_1.
Der volle Inhalt der QuelleTakahashi, Kenichi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura und Kazunori Sugahara. „Security as a Service for User Customized Data Protection“. In Software Engineering and Computer Systems, 298–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22191-0_27.
Der volle Inhalt der QuelleJacob, Matthias, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw und Ramarathnam Venkatesan. „The Superdiversifier: Peephole Individualization for Software Protection“. In Advances in Information and Computer Security, 100–120. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89598-5_7.
Der volle Inhalt der QuelleNiklas, Günter, und Dieter Nederveld. „Software-geführte Emissionsüberwachung im Kraftwerk“. In Informatik für den Umweltschutz / Computer Science for Environmental Protection, 70–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-77164-4_8.
Der volle Inhalt der QuelleAthanasiadis, Ioannis N. „How to Start an Environmental Software Project“. In Environmental Software Systems. Computer Science for Environmental Protection, 395–407. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-89935-0_33.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Software protection. Computer software"
Higginbotham, T. F. „Software protection of micro computer software (abstract only)“. In the 15th annual conference. New York, New York, USA: ACM Press, 1987. http://dx.doi.org/10.1145/322917.323051.
Der volle Inhalt der QuelleKirchhoefer, Gregg, und Russell E. Levine. „Legal Protection for Computer Software“. In Computer Graphics Conference and Exposition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 1987. http://dx.doi.org/10.4271/870916.
Der volle Inhalt der QuelleShi, Yejia. „Application of Computer Software Technology in Plant Protection Software Development“. In 2016 2nd International Conference on Materials Engineering and Information Technology Applications (MEITA 2016). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/meita-16.2017.91.
Der volle Inhalt der QuelleNovakovic, Jasmina. „Protection of property rights in computer software“. In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419150.
Der volle Inhalt der QuelleCabutto, Alessandro, Paolo Falcarin, Bert Abrath, Bart Coppens und Bjorn De Sutter. „Software Protection with Code Mobility“. In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808475.2808481.
Der volle Inhalt der QuelleANGUS, JOHN. „Software based data protection“. In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3080.
Der volle Inhalt der QuelleWu, Shan. „Reflections on our Computer Software Intellectual Property Protection“. In 2014 International Conference on Management Science and Management Innovation (MSMI 2014). Paris, France: Atlantis Press, 2014. http://dx.doi.org/10.2991/msmi-14.2014.9.
Der volle Inhalt der QuelleDe Sutter, Bjorn, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur und Jerome d'Annoville. „The ASPIRE Framework for Software Protection“. In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2995306.2995316.
Der volle Inhalt der QuelleWyseur, Brecht, und Bjorn De Sutter. „2nd International Workshop on Software Protection“. In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2990486.
Der volle Inhalt der QuelleTaynitskiy, Vladislav, Elena Gubar und Ekaterina Zhitkova. „Optimization of protection of computer networks against malicious software“. In 2016 International Conference "Stability and Oscillations of Nonlinear Control Systems" (Pyatnitskiy's Conference). IEEE, 2016. http://dx.doi.org/10.1109/stab.2016.7541231.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Software protection. Computer software"
Landwehr, Carl E. Protecting Unattended Computers Without Software. Fort Belvoir, VA: Defense Technical Information Center, Dezember 1997. http://dx.doi.org/10.21236/ada465472.
Der volle Inhalt der QuelleColeman, Clark L., Michele Co, Jack W. Davidson, John C. Knight, Anh Nguyen-Tuong und Jason D. Hiser. Software Exploit Prevention and Remediation via Software Memory Protection. Fort Belvoir, VA: Defense Technical Information Center, Mai 2009. http://dx.doi.org/10.21236/ada499993.
Der volle Inhalt der QuelleHumphrey, Watts S. CASE (Computer-Aided Software Engineering) Planning and the Software Process. Fort Belvoir, VA: Defense Technical Information Center, Mai 1989. http://dx.doi.org/10.21236/ada219066.
Der volle Inhalt der QuelleWang, Chenxi, Jack Davidson, Jonathan Hill und John Knight. Protection of Software-based Survivability Mechanisms. Fort Belvoir, VA: Defense Technical Information Center, Januar 2001. http://dx.doi.org/10.21236/ada466288.
Der volle Inhalt der QuelleStory, Alan. Intellectual Property and Computer Software. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2004. http://dx.doi.org/10.7215/ip_ip_20040501d.
Der volle Inhalt der QuelleMajewski, R. Computer Software End Product Documentation,. Fort Belvoir, VA: Defense Technical Information Center, Dezember 1998. http://dx.doi.org/10.21236/ada361247.
Der volle Inhalt der QuelleBloom, Howard M. Software and computer integrated manufacturing. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4468.
Der volle Inhalt der QuelleSilvan, G. R. PFP MICON DCS computer software documentation. Office of Scientific and Technical Information (OSTI), März 1996. http://dx.doi.org/10.2172/483529.
Der volle Inhalt der QuelleJuntti, Thomas M., und Mark A. Rumble. Arc Habitat Suitability Index computer software. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2006. http://dx.doi.org/10.2737/rmrs-gtr-180.
Der volle Inhalt der QuelleRogers, Patrick. Ada Embedded Computer Software Support (AECSS). Fort Belvoir, VA: Defense Technical Information Center, März 1993. http://dx.doi.org/10.21236/ada291202.
Der volle Inhalt der Quelle