Books tagged: obfuscation

These results show books which have been specifically tagged with this keyword. You can also try doing a general search for the term "obfuscation" .
You may also limit results to books that contain two tags.
Some content may be filtered out. To view such content, change your filtering option.

Found 3 results

Sigma²
Series: Darkwater Files: Bad Blood, Book 2. Price: $2.99 USD. Words: 98,950. Language: English. Published: September 25, 2018. Categories: Fiction » Mystery & detective » Women Sleuths
With the Snow investigation in limbo, Sandoval and Krypsek are called to an unusual scene where the victim was tortured before he died. Immediately, Krypsek understands they need expert assistance to sort through what clues might remain and calls London Winchester to help. The pathology is disturbing to everyone involved, but when London receives an odd threat, they know the killer is watching.
The Predator's Apprentice
Series: Eriksson (Darkwater Bay), Book 19. Price: $2.99 USD. Words: 102,770. Language: English. Published: December 19, 2017. Categories: Fiction » Mystery & detective » Women Sleuths
With a smear of lipstick leaving a scrawled and cryptic message, Helen Eriksson's world is shattered. Wendell is missing. Jerry Lowe is—God only knows what. A killer's prediction that the murders wouldn't stop with his arrest is the only truth in the devastating culmination of events in Darkwater Bay.
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
Price: $4.99 USD. Words: 4,840. Language: English. Published: April 22, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Software development & engineering / general
Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.