Books on the topic 'Software protection. Computer software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Software protection. Computer software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Sherman, Cary H. Computer software protection law. Washington, D.C: Bureau of National Affairs, 1989.
Find full textI, Bainbridge David, ed. Legal protection of computer software. 5th ed. Heath, West Sussex: Tottel Publishing, 2008.
Find full textKutten, L. J. Computer software: Protection, liability, law, forms. Deerfield, IL: Clark Boardman Callaghan, 1987.
Find full textKutten, L. J. Computer software: Protection, liability, law, forms. Saint Paul, MN: Thomson/West, 2003.
Find full textSamuelson, Pamela. Intellectual property protection for software. Pittsburgh, Pa: Carnegie Mellon University, Software Engineering Institute, 1989.
Find full textC̆ervĕn, Pavol. Crackproof your software: The best ways to protect your software against crackers. San Francisco: No Starch Press, 2002.
Find full textThe software developer's and marketer's legal companion: Protect your software and your software business. Reading, Mass: Addison-Wesley Pub. Co., 1993.
Find full textMorgan, Richard. Legal protection of software: A handbook. Welwyn Garden City, Hertfordshire [Eng.]: EMIS Professional Publ., 2002.
Find full textJ, David Irene, ed. The software business: Funding, protecting, and marketing software. Toronto: McGraw-Hill Ryerson, 1992.
Find full textSimon, David F. Computer law handbook: Software protection, contracts, litigation, forms. Philadelphia, Pa: American Law Institute-American Bar Association Committee on Continuing Professional Education, 1990.
Find full textComputer software: Legal protection in the United Kingdom. Oxford: ESC Publishing Ltd., 1987.
Find full textHenry, Carr. Computer software: Legal protection in the United Kingdom. 2nd ed. London: Sweet & Maxwell, 1992.
Find full textHřebíček, Jiří, Ralf Denzer, Gerald Schimak, and Tomáš Pitner, eds. Environmental Software Systems. Computer Science for Environmental Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-89935-0.
Full textChow, Stephen Y., Jessica Costa, and Maura K. Moran. Sophisticated software licensing, 2015. Boston, MA: MCLE New England, 2015.
Find full textMcMahon, Michael J. Software and the law. Dublin: University College Dublin, 1994.
Find full textDelpech, Horacio Fernández. Protección jurídica del software. Buenos Aires: Abeledo Perrot, 2000.
Find full textKeet, Ernest E. Preventing piracy: A business guide to software protection. Reading, Mass: Addison-Wesley Pub. Co., 1985.
Find full textXue, Hong, and Hong Xue. Software protection in China: A complete guide. Hong Kong: Sweet & Maxwell Asia, 1999.
Find full textSoftware law: A user-friendly legal guide for software developers : with forms. Naperville, Ill: Sourcebooks, 1997.
Find full textLandy, Gene K. Software developer's and marketer's legal companion: Protect yoursoftware and your software business. Reading, Mass: Addison-Wesley, 1993.
Find full textMagnan, Richard A. Copyright, patent, and trade secret protection of software. [Alexandria, VA: Defense Technical Information Center, 1986.
Find full textStephen, Elias, and Warner Ralph E, eds. Legal care for your software: A step-by-step guide for computer software writers and publishers. 3rd ed. Berkeley, CA: Nolo Press Book, 1987.
Find full textRemer, Daniel. Legal care for your software: A step-by-step guide for computer software writers and publishers. Edited by Elias Stephen, Warner Ralph E, and Nolo Press. 3rd ed. Berkeley, CA: Nolo Press, 1987.
Find full textLegal care for your software: A step-by-step guide for computer software writers and publishers. 4th ed. Terra Linda, Calif: RDS Pub. Co., 1992.
Find full textInstitute, Pennsylvania Bar. Anatomy of a software license. [Mechanicsburg, Pa.]: Pennsylvania Bar Institute, 2011.
Find full textYang, Xiang, and SpringerLink (Online service), eds. Software Similarity and Classification. London: Springer London, 2012.
Find full textThird party protection of software and firmware: Direct protection of zeros and ones. Amsterdam: North-Holland, 1985.
Find full textHarris, Dorothy. Copyright protection of computer software policy issues for Australian libraries. Perth, Western Australia: [Library and Information Service of Western Australia], 1990.
Find full textComputer contracts: An international guide to agreements and software protection. New York: Chapman and Hall, 1985.
Find full textJasvir, Nagra, ed. Surreptitious software: Obfuscation, watermarking, and tamperproofing for program protection. Upper Saddle River, NJ: Addison-Wesley, 2009.
Find full textWeimer, Douglas Reid. Copyright protection for certain federally funded software: A legal analysis. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1992.
Find full textRåman, Jari. Regulating secure software development: Analysing the potential regulatory solutions for the lack of security in software. Rovaniemi: University of Lapland, 2006.
Find full textLawrence, Jim. Software reliability and safety in nuclear reactor protection systems. Washington, DC: Division of Reactor Controls and Human Factors, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, 1993.
Find full textLawrence, J. D. Software reliability and safety in nuclear reactor protection systems. Washington, DC: Division of Reactor Controls and Human Factors, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, 1993.
Find full textJansen, Wayne. Mobile agent security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textJansen, Wayne. Mobile agent security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textJansen, Wayne. Mobile agent security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textNichols, Kenneth. Inventing software: The rise of "computer-related" patents. Westport, Conn: Quorum Books, 1998.
Find full textSoftware protection: Practical and legal steps to protect and market computer programs. New York: Van Nostrand Reinhold, 1985.
Find full textA, Glenn Michael, Yoches E. Robert, and Practising Law Institute, eds. Computer software protection. New York: Practising Law Institute, 1997.
Find full textLegal protection of computer software. [Harrisburg, Pa.] (104 S. St., Harrisburg 17108-1027): Pennsylvania Bar Institute, 1996.
Find full textDavis, G. Gervaise III. Computer Software: Protection and Licensing. Lifetime Learning Pub, 1985.
Find full text