Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
- This book is about software piracy--what it is and how it's done
- This is the first book ever to describe how software is actually stolen and traded over the internet
- Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software
General Computer Users.
Chapter 1 INTRODUCTION Chapter 2 WHY SOFTWARE IS PIRATED Chapter 3 TYPES OF SOFTWARE Chapter 4 TYPES OF CRACKS Chapter 5 HAZARDS, PRECAUTIONS, & SOLUTIONS Chapter 6 PIRATED SOFTWARE SOURCES Chapter 7 CRACKING ILLUSTRATED Chapter 8 USEFUL TOOLS Chapter 9 THE SOFTWARE COMPANIES FIGHT BACK Chapter 10 SUMMARY & CONCLUSION
- No. of pages:
- © Syngress 2005
- 12th April 2005
- Paperback ISBN:
- eBook ISBN:
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.