\(
\def\WIPO{World Intellectual Property Organisation}
\)
The software IP detective's handbook : measurement, comparison, and infringement detection.
2011
F 633 ZEI.S
Available at WIPO Library
Items
Details
Title
The software IP detective's handbook : measurement, comparison, and infringement detection.
Author
Zeidman, Robert,
Description
xxvi, 450 pages : illustrations ; 23 cm
ISBN
9780137035335 Print
0137035330 paperback
0137035330 paperback
Alternate Call Number
F 633 ZEI.S
Summary
"IP, software plagiarism, patents, and copyrights are complicated subjects. This book explains the key elements better than anything else I have seen. I highly recommend it to anyone who develops software or needs to protect proprietary software algorithms, and to all attorneys involved with IP litigation." - Capers Jones, President, Capers Jones & Associates LLC "Bob has done a fantastic job making computer science forensics understandable to attorneys, engineers, and managers. This is the ultimate handbook for expert witnesses, due diligence execution, and developing baselines for software valuation. Buy it before your competitors do!" -Don Shafer, CSDP, CTO, Athens Group LLC The Definitive Software IP Guide for Developers, Managers, Entrepreneurs, Attorneys, and Consultants The Software IT Detective's Handbook is the definitive reference for every software intellectual property owner, developer, manager, attorney, or consultant called upon to uncover theft-and, if necessary, prove it in court. Pioneering expert Bob Zeidman-creator of CodeSuiteª, the world's #1 software IP analysis tool-thoroughly covers all technical and legal aspects of IP theft detection. Using his rigorous framework and practical examples, you can accurately determine whether software copying, theft, or infringement has occurred, and fully support your findings in any venue. This book will help you Understand the key concepts that underlie software IP analysis Compare and correlate source code Identify and measure copying Uncover signs of copying in object code when source code is inaccessible Compare functional source code statements to nonfunctional comments Confirm suspected theft or infringement Track malware and third-party code in applications Use software clean rooms to avoid IP infringement Understand IP issues associated with open source and DMCA Visit www.SAFE-corp.biz to download your free trial version of CodeSuiteª, the industry's #1 tool for detecting software copying.
Bibliography, etc. Note
Includes bibliographical references (pages 423-434) and index.
Formatted Contents Note
I. Introduction; II. Software; III. Intellectual property; IV. Source code differentiation; V. Source code correlation; VI. Object and source/object code correlation; VII. Source code cross-correlation; VIII. Detecting software IP THEFT and infringement; IX. Miscellaneous topics; X. Conclusion: past, present, and future.
pt. 1. Introduction
About this book
Intellectual property crime
pt. 2. Software
Source code
Object code and assembly code
Scripts, intermediate code, macros and systhesis primitives
pt. 3. Intellectual property
Coprights
Patents
Trade secrets
Software forensics
pt. 4. Source code differentation
Theory
Implementation
Applications
pt. 5. Source code correlation
Software plagiarism detection
Source code characterization
Theory
Implementation
Applications
pt. 6. Object and sourcce/Object code correlation
Theory, implementation and applications
pt. 8. Detecting software IP theft and infringement
Detecting copyright infringement
Detecting patent infringement
Detecting trade secret theft
pt. 9. Miscellaneous topics
Implementing a software clean room
Open source software
Digital Millennium copyright act
pt. 10. Conclusion:past, present, and future.
pt. 1. Introduction
About this book
Intellectual property crime
pt. 2. Software
Source code
Object code and assembly code
Scripts, intermediate code, macros and systhesis primitives
pt. 3. Intellectual property
Coprights
Patents
Trade secrets
Software forensics
pt. 4. Source code differentation
Theory
Implementation
Applications
pt. 5. Source code correlation
Software plagiarism detection
Source code characterization
Theory
Implementation
Applications
pt. 6. Object and sourcce/Object code correlation
Theory, implementation and applications
pt. 8. Detecting software IP theft and infringement
Detecting copyright infringement
Detecting patent infringement
Detecting trade secret theft
pt. 9. Miscellaneous topics
Implementing a software clean room
Open source software
Digital Millennium copyright act
pt. 10. Conclusion:past, present, and future.
Published
Upper Saddle River, NJ : Prentice Hall, 2011.
Language
English
Record Appears in
all