Hidden Keys to Software Break-Ins and Unauthorized

Hidden Keys to Software Break-Ins and Unauthorized

4.11 - 1251 ratings - Source

Primarily for software developers but also useful for those who want to grasp the integral ideas and problems of modern data protection technologies, this book deals with the basic problems concerning software and data security. Stressed are the most common mistakes made by developers and the main principles to be reckoned with when developing security tools. Also provided is information on cryptography and cryptanalysis and a review of the means and methods commonly used for software security, as well as a demonstration of the weak points of these methods. In addition, the problems associated with implementing digital rights management (DRM) systems are covered along with the current methods and technologies used to look for weak areas in a program.it is possible to read the decrypted code section from the memory when the application is running, compute the gamma applied during encryption, and ... The developer kit that comes with HASP dongles includes the HASP Envelope protector.

Title:Hidden Keys to Software Break-Ins and Unauthorized
Author:Dmitry Sklyarov
Publisher:БХВ-Петербург - 2003


You Must CONTINUE and create a free account to access unlimited downloads & streaming