Here are entered works on various techniques used to protect software against unauthorized use or duplication
1
Computer software -- Purchasing : Rapid acquisition and fielding for information assurance and cyber security in the Navy / Isaac R. Porche III, Shawn McKay, Megan McKernan, Robert W. Button, Bob Murphy, Kate Giglio, Elliot Axelband
2012
1
Computer software -- Purchasing -- United States : Rapid acquisition and fielding for information assurance and cyber security in the Navy / Isaac R. Porche III, Shawn McKay, Megan McKernan, Robert W. Button, Bob Murphy, Kate Giglio, Elliot Axelband
Computer software -- Reliability -- Research : Dependable systems : software, computing, networks : research results of the DICS program / Jürg Kohlas, Bertrand Meyer, André Schiper (eds.)
Computer software -- Specifications -- Congresses : Specification and design of software systems : Conference on Operating Systems Visegrad, Hungary, January 23-27, 1982, proceedings / edited by E. Knuth and E.J. Neuhold
Computer software -- Standards -- United States : Crossroads of information technology standards : a report / prepared by the Workshop Committee Crossroads of Information Technology Standards, Board on Telecommunications and Computer Applications, Commission on Engineering and Technical Systems, National Research Council
Computer software -- Study and teaching. : Teach yourself visually Macromedia Web Collection : Flash, Dreamweaver, Fireworks / by Sherry Willard Kinkoph, Mike Wooldridge, and Sue Plumley ; compiled by Michael Toot