Compact Disc and DVD copy protection

Results: 20



#Item
1Jai Dadabhai  22-Sep-2011 CS 557 Presentation

Jai Dadabhai 22-Sep-2011 CS 557 Presentation

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-09-22 19:59:02
2Securing DRM and Multimedia Applications through Guard Technology Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft.

Securing DRM and Multimedia Applications through Guard Technology Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft.

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:57:15
3Software / Computer architecture / Computing / Compact Disc and DVD copy protection / 4th Dimension / Cross-platform software / Windows XP / Windows Vista / Computer / Personal computer / 4D / Installation

OUTLINE 4D Outline 4D is a remarkable outliner that lets you brainstorm create, structure, and organize your ideas. Outline 4D has a familiar, vertical outline format, and a unique horizontal timeline format to outline p

Add to Reading List

Source URL: support.screenplay.com

Language: English - Date: 2010-04-12 14:00:09
4Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten∗ Center for Information Technology Policy Department of Computer Science Princeton University Extended Version – February 14, 2006†

Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten∗ Center for Information Technology Policy Department of Computer Science Princeton University Extended Version – February 14, 2006†

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-09-04 14:38:52
5Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten∗ Center for Information Technology Policy Department of Computer Science Princeton University Extended Version – February 14, 2006†

Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten∗ Center for Information Technology Policy Department of Computer Science Princeton University Extended Version – February 14, 2006†

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2010-10-27 21:12:56
6Cites & Insights Crawford at Large Volume 3, Number 2: FebruaryISSN

Cites & Insights Crawford at Large Volume 3, Number 2: FebruaryISSN

Add to Reading List

Source URL: citesandinsights.info

Language: English - Date: 2006-07-15 15:54:50
7Cites & Insights: Crawford at Large

Cites & Insights: Crawford at Large

Add to Reading List

Source URL: www.citesandinsights.info

Language: English - Date: 2006-07-15 15:59:31
8Cites & Insights Crawford at Large Volume 3, Number 2: FebruaryISSN

Cites & Insights Crawford at Large Volume 3, Number 2: FebruaryISSN

Add to Reading List

Source URL: www.citesandinsights.info

Language: English - Date: 2006-07-15 15:54:50
9Cites & Insights: Crawford at Large 5:7

Cites & Insights: Crawford at Large 5:7

Add to Reading List

Source URL: www.citesandinsights.info

Language: English - Date: 2006-07-15 16:00:30
10The BAck Page  80  Computerworld  November 14, 2005 fran k hayes  n

The BAck Page 80  Computerworld  November 14, 2005 fran k hayes n

Add to Reading List

Source URL: www.tabpi.org

Language: English - Date: 2007-08-14 08:09:00