The software IP detective's handbook : (Record no. 10090)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01565nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100632.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780137035335 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | K 1443.C6 .Z45 2011 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Zeidman, Robert |
Relator term | author |
245 #4 - TITLE STATEMENT | |
Title | The software IP detective's handbook : |
Remainder of title | measurement, comparison, and infringement detection / |
Statement of responsibility, etc. | Robert Zeidman |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Upper Saddle River, New Jersey : |
Name of publisher, distributor, etc. | Prentice-Hall, |
Date of publication, distribution, etc. | c2011 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvi, 450 pages : |
Other physical details | illustrations ; |
Dimensions | 23 cm. |
365 ## - TRADE PRICE | |
Price amount | USD17.99 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part 1. Introduction -- Part 2. Software -- Part 3. Intellectual property -- Part 4. Source code differentiation -- Part 5. Source code correlation -- Part 6. Object and sourcce/Object code correlation -- Part 8. Detecting software IP theft and infringement -- Part 9. Miscellaneous topics -- Part 10. Conclusion: past, present, and future. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book will help you understand the key concepts that underlie software IP analysis ; Compare and correlate source code; Identify and measure copying; Uncover signs of copying in object code when source code is inaccessible; Compare functional source code statements to nonfunctional comments; Confirm suspected theft or infringement; Track malware and third-party code in applications; Use software clean rooms to avoid IP infringement; Understand IP issues associated with open source; and DMCA. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | INTELLECTUAL PROPERTY |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books - Reference |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Gen. Ed. - CCIT | LRC - Main | National University - Manila | Reference | 08/06/2014 | Purchased - Amazon | 17.99 | REF K 1443.C6 .Z45 2011 | NULIB000007849 | 05/20/2025 | c.1 | 05/20/2025 | Books - Reference |