Academic literature on the topic 'Software protection. Computer software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software protection. Computer software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software protection. Computer software"

1

Aubyn, John St. "Computer-software protection." Learned Publishing 5, no. 2 (January 1, 1992): 103–4. http://dx.doi.org/10.1002/leap/50035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Menell, Peter S. "Tailoring Legal Protection for Computer Software." Stanford Law Review 39, no. 6 (July 1987): 1329. http://dx.doi.org/10.2307/1228849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cifuentes, C. "Australian Recommendations on Computer Software Protection." Computer Journal 39, no. 7 (July 1, 1996): 566–76. http://dx.doi.org/10.1093/comjnl/39.7.566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Greaves, D. W. "Computer software — Protection/liability/law/forms." Computer Law & Security Review 4, no. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Assia, Naomi. "Software protection in Israel." International Review of Law, Computers & Technology 7, no. 1 (January 1993): 221–30. http://dx.doi.org/10.1080/13600869.1993.9966364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Hua Shan, and Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption." Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.

Full text
Abstract:
Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhao, Chun Yang, and Wei Ping Wang. "USB Storage Device Protection Software." Advanced Materials Research 722 (July 2013): 244–49. http://dx.doi.org/10.4028/www.scientific.net/amr.722.244.

Full text
Abstract:
U disk is the most convenient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.
APA, Harvard, Vancouver, ISO, and other styles
8

Samuels, Linda B., and Jeffrey M. Samuels. "New Developments in Copyright Protection of Computer Software." International Journal of Legal Information 15, no. 5-6 (December 1987): 195–200. http://dx.doi.org/10.1017/s0731126500021090.

Full text
Abstract:
The scope of copyright protection for computer programs has proven to be a vexing issue for the courts. Over the past year, several courts focused on the issue and reached different results. This article will give background and then review and comment upon the newest decisions.
APA, Harvard, Vancouver, ISO, and other styles
9

Roarke, Robert F., and Catherine Szenczy. "Computer software and copyright protection: Health care implications." Journal of Healthcare Risk Management 12, no. 4 (June 1992): 5–11. http://dx.doi.org/10.1002/jhrm.5600120404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shalgi, Moshe. "Copyright in Software and Data." Israel Law Review 21, no. 1 (1986): 15–22. http://dx.doi.org/10.1017/s0021223700008852.

Full text
Abstract:
The advent of a new brand of intellectual creativity, which followed developments in computer technology, created a considerable body of proprietory interests in computer software and data. There was therefore a search for legal instruments to provide protection against unauthorized exploitation of the intellectual property in them.Several legal paths were attempted: contractual protection, patent law, trade secrets law and copyright. Of these, the current opinion is that copyright law is the most suitable instrument to protect rights in software and data.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software protection. Computer software"

1

Rush, Andrea Friedman. "Legal protection of computer software in Canada." Thesis, University of Ottawa (Canada), 1985. http://hdl.handle.net/10393/4750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fragkos, Georgios. "An event-trace language for software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002.
Thesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Volynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garren, Scott L. (Scott Leland). "Copyright protection of computer software : history, politics, and technology." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/28007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ostrovsky, Rafail. "Software protection and simulation on oblivious RAMs." Thesis, Massachusetts Institute of Technology, 1992. http://hdl.handle.net/1721.1/103684.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1992.
Includes bibliographical references (p. 71-72).
by Rafail M. Ostrovsky.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
6

Råman, Jari. "Regulating secure software development : analysing the potential regulatory solutions for the lack of security in software /." Rovaniemi : University of Lapland, 2006. http://www.loc.gov/catdir/toc/fy0803/2006499062.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Everett, Christopher E. "Fundamentals of software patent protection at a university." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-01062003-174536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lai, Stanley. "The copyright protection of computer software in the United Kingdom." Thesis, University of Cambridge, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Woo, Yan. "A dynamic integrity verification scheme for tamper-resistance software." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B34740478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Woo, Yan, and 胡昕. "A dynamic integrity verification scheme for tamper-resistancesoftware." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B34740478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Software protection. Computer software"

1

Sherman, Cary H. Computer software protection law. Washington, D.C: Bureau of National Affairs, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

I, Bainbridge David, ed. Legal protection of computer software. 5th ed. Heath, West Sussex: Tottel Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Robertson, Ranald. Legal protection of computer software. London: Longman, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kutten, L. J. Computer software: Protection, liability, law, forms. Deerfield, IL: Clark Boardman Callaghan, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kutten, L. J. Computer software: Protection, liability, law, forms. Saint Paul, MN: Thomson/West, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Samuelson, Pamela. Intellectual property protection for software. Pittsburgh, Pa: Carnegie Mellon University, Software Engineering Institute, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

C̆ervĕn, Pavol. Crackproof your software: The best ways to protect your software against crackers. San Francisco: No Starch Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The software developer's and marketer's legal companion: Protect your software and your software business. Reading, Mass: Addison-Wesley Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Software patents. 2nd ed. Gaithersburg: Aspen Law & Business, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Software patents. New York: Wiley Law Publications, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Software protection. Computer software"

1

van Oorschot, Paul C. "Revisiting Software Protection." In Lecture Notes in Computer Science, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lane, V. P. "Protection of Proprietary Software." In Security of Computer Based Information Systems, 144–54. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pieprzyk, Josef. "Fingerprints for Copyright Software Protection." In Lecture Notes in Computer Science, 178–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jeges, Ernő, Zoltán Hornák, Gergely Eberhardt, and Zoltán Nagy. "Watermarking Software to Signal Copy Protection." In Communications in Computer and Information Science, 408–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73986-9_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Feigenbaum, Joan, Mark Liberman, and Rebecca Wright. "Cryptographic protection of databases and software." In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 1. Providence, Rhode Island: American Mathematical Society, 1991. http://dx.doi.org/10.1090/dimacs/002/10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Page, B. "Environmental Informatics Towards a new Discipline in Applied Computer Science for Environmental Protection and Research." In Environmental Software Systems, 3–22. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34951-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Takahashi, Kenichi, Takanori Matsuzaki, Tsunenori Mine, Takao Kawamura, and Kazunori Sugahara. "Security as a Service for User Customized Data Protection." In Software Engineering and Computer Systems, 298–309. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22191-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jacob, Matthias, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, and Ramarathnam Venkatesan. "The Superdiversifier: Peephole Individualization for Software Protection." In Advances in Information and Computer Security, 100–120. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89598-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Niklas, Günter, and Dieter Nederveld. "Software-geführte Emissionsüberwachung im Kraftwerk." In Informatik für den Umweltschutz / Computer Science for Environmental Protection, 70–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/978-3-642-77164-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Athanasiadis, Ioannis N. "How to Start an Environmental Software Project." In Environmental Software Systems. Computer Science for Environmental Protection, 395–407. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-89935-0_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software protection. Computer software"

1

Higginbotham, T. F. "Software protection of micro computer software (abstract only)." In the 15th annual conference. New York, New York, USA: ACM Press, 1987. http://dx.doi.org/10.1145/322917.323051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirchhoefer, Gregg, and Russell E. Levine. "Legal Protection for Computer Software." In Computer Graphics Conference and Exposition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 1987. http://dx.doi.org/10.4271/870916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Yejia. "Application of Computer Software Technology in Plant Protection Software Development." In 2016 2nd International Conference on Materials Engineering and Information Technology Applications (MEITA 2016). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/meita-16.2017.91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Novakovic, Jasmina. "Protection of property rights in computer software." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cabutto, Alessandro, Paolo Falcarin, Bert Abrath, Bart Coppens, and Bjorn De Sutter. "Software Protection with Code Mobility." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808475.2808481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

ANGUS, JOHN. "Software based data protection." In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Shan. "Reflections on our Computer Software Intellectual Property Protection." In 2014 International Conference on Management Science and Management Innovation (MSMI 2014). Paris, France: Atlantis Press, 2014. http://dx.doi.org/10.2991/msmi-14.2014.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

De Sutter, Bjorn, Cataldo Basile, Mariano Ceccato, Paolo Falcarin, Michael Zunke, Brecht Wyseur, and Jerome d'Annoville. "The ASPIRE Framework for Software Protection." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2995306.2995316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wyseur, Brecht, and Bjorn De Sutter. "2nd International Workshop on Software Protection." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2990486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Taynitskiy, Vladislav, Elena Gubar, and Ekaterina Zhitkova. "Optimization of protection of computer networks against malicious software." In 2016 International Conference "Stability and Oscillations of Nonlinear Control Systems" (Pyatnitskiy's Conference). IEEE, 2016. http://dx.doi.org/10.1109/stab.2016.7541231.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software protection. Computer software"

1

Landwehr, Carl E. Protecting Unattended Computers Without Software. Fort Belvoir, VA: Defense Technical Information Center, December 1997. http://dx.doi.org/10.21236/ada465472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coleman, Clark L., Michele Co, Jack W. Davidson, John C. Knight, Anh Nguyen-Tuong, and Jason D. Hiser. Software Exploit Prevention and Remediation via Software Memory Protection. Fort Belvoir, VA: Defense Technical Information Center, May 2009. http://dx.doi.org/10.21236/ada499993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Humphrey, Watts S. CASE (Computer-Aided Software Engineering) Planning and the Software Process. Fort Belvoir, VA: Defense Technical Information Center, May 1989. http://dx.doi.org/10.21236/ada219066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Chenxi, Jack Davidson, Jonathan Hill, and John Knight. Protection of Software-based Survivability Mechanisms. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada466288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Story, Alan. Intellectual Property and Computer Software. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2004. http://dx.doi.org/10.7215/ip_ip_20040501d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Majewski, R. Computer Software End Product Documentation,. Fort Belvoir, VA: Defense Technical Information Center, December 1998. http://dx.doi.org/10.21236/ada361247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bloom, Howard M. Software and computer integrated manufacturing. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.4468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Silvan, G. R. PFP MICON DCS computer software documentation. Office of Scientific and Technical Information (OSTI), March 1996. http://dx.doi.org/10.2172/483529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Juntti, Thomas M., and Mark A. Rumble. Arc Habitat Suitability Index computer software. Ft. Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station, 2006. http://dx.doi.org/10.2737/rmrs-gtr-180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rogers, Patrick. Ada Embedded Computer Software Support (AECSS). Fort Belvoir, VA: Defense Technical Information Center, March 1993. http://dx.doi.org/10.21236/ada291202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography