Academic literature on the topic 'Software protection. Computer software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software protection. Computer software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software protection. Computer software"
Aubyn, John St. "Computer-software protection." Learned Publishing 5, no. 2 (January 1, 1992): 103–4. http://dx.doi.org/10.1002/leap/50035.
Full textMenell, Peter S. "Tailoring Legal Protection for Computer Software." Stanford Law Review 39, no. 6 (July 1987): 1329. http://dx.doi.org/10.2307/1228849.
Full textCifuentes, C. "Australian Recommendations on Computer Software Protection." Computer Journal 39, no. 7 (July 1, 1996): 566–76. http://dx.doi.org/10.1093/comjnl/39.7.566.
Full textGreaves, D. W. "Computer software — Protection/liability/law/forms." Computer Law & Security Review 4, no. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.
Full textAssia, Naomi. "Software protection in Israel." International Review of Law, Computers & Technology 7, no. 1 (January 1993): 221–30. http://dx.doi.org/10.1080/13600869.1993.9966364.
Full textTan, Hua Shan, and Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption." Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.
Full textZhao, Chun Yang, and Wei Ping Wang. "USB Storage Device Protection Software." Advanced Materials Research 722 (July 2013): 244–49. http://dx.doi.org/10.4028/www.scientific.net/amr.722.244.
Full textSamuels, Linda B., and Jeffrey M. Samuels. "New Developments in Copyright Protection of Computer Software." International Journal of Legal Information 15, no. 5-6 (December 1987): 195–200. http://dx.doi.org/10.1017/s0731126500021090.
Full textRoarke, Robert F., and Catherine Szenczy. "Computer software and copyright protection: Health care implications." Journal of Healthcare Risk Management 12, no. 4 (June 1992): 5–11. http://dx.doi.org/10.1002/jhrm.5600120404.
Full textShalgi, Moshe. "Copyright in Software and Data." Israel Law Review 21, no. 1 (1986): 15–22. http://dx.doi.org/10.1017/s0021223700008852.
Full textDissertations / Theses on the topic "Software protection. Computer software"
Rush, Andrea Friedman. "Legal protection of computer software in Canada." Thesis, University of Ottawa (Canada), 1985. http://hdl.handle.net/10393/4750.
Full textFragkos, Georgios. "An event-trace language for software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.
Full textThesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
Volynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.
Find full textGarren, Scott L. (Scott Leland). "Copyright protection of computer software : history, politics, and technology." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/28007.
Full textOstrovsky, Rafail. "Software protection and simulation on oblivious RAMs." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/103684.
Full textIncludes bibliographical references (p. 71-72).
by Rafail M. Ostrovsky.
Ph.D.
Råman, Jari. "Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /." Rovaniemi : University of Lapland, 2006. http://www.loc.gov/catdir/toc/fy0803/2006499062.html.
Full textEverett, Christopher E. "Fundamentals of software patent protection at a university." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-01062003-174536.
Full textLai, Stanley. "The copyright protection of computer software in the United Kingdom." Thesis, University of Cambridge, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413087.
Full textWoo, Yan. "A dynamic integrity verification scheme for tamper-resistance software." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B34740478.
Full textWoo, Yan, and 胡昕. "A dynamic integrity verification scheme for tamper-resistancesoftware." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B34740478.
Full textBooks on the topic "Software protection. Computer software"
Sherman, Cary H. Computer software protection law. Washington, D.C: Bureau of National Affairs, 1989.
Find full textI, Bainbridge David, ed. Legal protection of computer software. 5th ed. Heath, West Sussex: Tottel Publishing, 2008.
Find full textKutten, L. J. Computer software: Protection, liability, law, forms. Deerfield, IL: Clark Boardman Callaghan, 1987.
Find full textKutten, L. J. Computer software: Protection, liability, law, forms. Saint Paul, MN: Thomson/West, 2003.
Find full textSamuelson, Pamela. Intellectual property protection for software. Pittsburgh, Pa: Carnegie Mellon University, Software Engineering Institute, 1989.
Find full textC̆ervĕn, Pavol. Crackproof your software: The best ways to protect your software against crackers. San Francisco: No Starch Press, 2002.
Find full textThe software developer's and marketer's legal companion: Protect your software and your software business. Reading, Mass: Addison-Wesley Pub. Co., 1993.
Find full textBook chapters on the topic "Software protection. Computer software"
van Oorschot, Paul C. "Revisiting Software Protection." In Lecture Notes in Computer Science, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_1.
Full textLane, V. P. "Protection of Proprietary Software." In Security of Computer Based Information Systems, 144–54. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_10.
Full textPieprzyk, Josef. "Fingerprints for Copyright Software Protection." In Lecture Notes in Computer Science, 178–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x_15.
Full textJeges, Ernő, Zoltán Hornák, Gergely Eberhardt, and Zoltán Nagy. "Watermarking Software to Signal Copy Protection." In Communications in Computer and Information Science, 408–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9_36.
Full textFeigenbaum, Joan, Mark Liberman, and Rebecca Wright. "Cryptographic protection of databases and software." In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 1. Providence, Rhode Island: American Mathematical Society, 1991. http://dx.doi.org/10.1090/dimacs/002/10.
Full textPage, B. "Environmental Informatics Towards a new Discipline in Applied Computer Science for Environmental Protection and Research." In Environmental Software Systems, 3–22. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34951-0_1.
Full textTakahashi, Kenichi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, and Kazunori Sugahara. "Security as a Service for User Customized Data Protection." In Software Engineering and Computer Systems, 298–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22191-0_27.
Full textJacob, Matthias, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, and Ramarathnam Venkatesan. "The Superdiversifier: Peephole Individualization for Software Protection." In Advances in Information and Computer Security, 100–120. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89598-5_7.
Full textNiklas, Günter, and Dieter Nederveld. "Software-geführte Emissionsüberwachung im Kraftwerk." In Informatik für den Umweltschutz / Computer Science for Environmental Protection, 70–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-77164-4_8.
Full textAthanasiadis, Ioannis N. "How to Start an Environmental Software Project." In Environmental Software Systems. Computer Science for Environmental Protection, 395–407. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-89935-0_33.
Full textConference papers on the topic "Software protection. Computer software"
Higginbotham, T. F. "Software protection of micro computer software (abstract only)." In the 15th annual conference. New York, New York, USA: ACM Press, 1987. http://dx.doi.org/10.1145/322917.323051.
Full textKirchhoefer, Gregg, and Russell E. Levine. "Legal Protection for Computer Software." In Computer Graphics Conference and Exposition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 1987. http://dx.doi.org/10.4271/870916.
Full textShi, Yejia. "Application of Computer Software Technology in Plant Protection Software Development." In 2016 2nd International Conference on Materials Engineering and Information Technology Applications (MEITA 2016). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/meita-16.2017.91.
Full textNovakovic, Jasmina. "Protection of property rights in computer software." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419150.
Full textCabutto, Alessandro, Paolo Falcarin, Bert Abrath, Bart Coppens, and Bjorn De Sutter. "Software Protection with Code Mobility." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808475.2808481.
Full textANGUS, JOHN. "Software based data protection." In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3080.
Full textWu, Shan. "Reflections on our Computer Software Intellectual Property Protection." In 2014 International Conference on Management Science and Management Innovation (MSMI 2014). Paris, France: Atlantis Press, 2014. http://dx.doi.org/10.2991/msmi-14.2014.9.
Full textDe Sutter, Bjorn, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, and Jerome d'Annoville. "The ASPIRE Framework for Software Protection." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2995306.2995316.
Full textWyseur, Brecht, and Bjorn De Sutter. "2nd International Workshop on Software Protection." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2990486.
Full textTaynitskiy, Vladislav, Elena Gubar, and Ekaterina Zhitkova. "Optimization of protection of computer networks against malicious software." In 2016 International Conference "Stability and Oscillations of Nonlinear Control Systems" (Pyatnitskiy's Conference). IEEE, 2016. http://dx.doi.org/10.1109/stab.2016.7541231.
Full textReports on the topic "Software protection. Computer software"
Landwehr, Carl E. Protecting Unattended Computers Without Software. Fort Belvoir, VA: Defense Technical Information Center, December 1997. http://dx.doi.org/10.21236/ada465472.
Full textColeman, Clark L., Michele Co, Jack W. Davidson, John C. Knight, Anh Nguyen-Tuong, and Jason D. Hiser. Software Exploit Prevention and Remediation via Software Memory Protection. Fort Belvoir, VA: Defense Technical Information Center, May 2009. http://dx.doi.org/10.21236/ada499993.
Full textHumphrey, Watts S. CASE (Computer-Aided Software Engineering) Planning and the Software Process. Fort Belvoir, VA: Defense Technical Information Center, May 1989. http://dx.doi.org/10.21236/ada219066.
Full textWang, Chenxi, Jack Davidson, Jonathan Hill, and John Knight. Protection of Software-based Survivability Mechanisms. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada466288.
Full textStory, Alan. Intellectual Property and Computer Software. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2004. http://dx.doi.org/10.7215/ip_ip_20040501d.
Full textMajewski, R. Computer Software End Product Documentation,. Fort Belvoir, VA: Defense Technical Information Center, December 1998. http://dx.doi.org/10.21236/ada361247.
Full textBloom, Howard M. Software and computer integrated manufacturing. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4468.
Full textSilvan, G. R. PFP MICON DCS computer software documentation. Office of Scientific and Technical Information (OSTI), March 1996. http://dx.doi.org/10.2172/483529.
Full textJuntti, Thomas M., and Mark A. Rumble. Arc Habitat Suitability Index computer software. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2006. http://dx.doi.org/10.2737/rmrs-gtr-180.
Full textRogers, Patrick. Ada Embedded Computer Software Support (AECSS). Fort Belvoir, VA: Defense Technical Information Center, March 1993. http://dx.doi.org/10.21236/ada291202.
Full text