Book description
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.- This book is about software piracy--what it is and how it's done
- This is the first book ever to describe how software is actually stolen and traded over the internet
- Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software
Table of contents
- Cover (1/2)
- Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Foreword
- Inside Software Piracy (1/4)
- Inside Software Piracy (2/4)
- Inside Software Piracy (3/4)
- Inside Software Piracy (4/4)
- The History of Software Piracy (1/3)
- The History of Software Piracy (2/3)
- The History of Software Piracy (3/3)
- The Suppliers (1/6)
- The Suppliers (2/6)
- The Suppliers (3/6)
- The Suppliers (4/6)
- The Suppliers (5/6)
- The Suppliers (6/6)
- Crackers (1/7)
- Crackers (2/7)
- Crackers (3/7)
- Crackers (4/7)
- Crackers (5/7)
- Crackers (6/7)
- Crackers (7/7)
- The Release (1/3)
- The Release (2/3)
- The Release (3/3)
- Sites (1/4)
- Sites (2/4)
- Sites (3/4)
- Sites (4/4)
- The Distribution Chain (1/7)
- The Distribution Chain (2/7)
- The Distribution Chain (3/7)
- The Distribution Chain (4/7)
- The Distribution Chain (5/7)
- The Distribution Chain (6/7)
- The Distribution Chain (7/7)
- The Piracy Scene (1/5)
- The Piracy Scene (2/5)
- The Piracy Scene (3/5)
- The Piracy Scene (4/5)
- The Piracy Scene (5/5)
- Piracy and the Law (1/6)
- Piracy and the Law (2/6)
- Piracy and the Law (3/6)
- Piracy and the Law (4/6)
- Piracy and the Law (5/6)
- Piracy and the Law (6/6)
- The Future of Piracy (1/3)
- The Future of Piracy (2/3)
- The Future of Piracy (3/3)
- Closing Notes
- Pirating Software: Attitudes and Reasons (1/3)
- Pirating Software: Attitudes and Reasons (2/3)
- Pirating Software: Attitudes and Reasons (3/3)
- Why Software is Pirated (1/3)
- Why Software is Pirated (2/3)
- Why Software is Pirated (3/3)
- Hazards, Solutions and Tools (1/5)
- Hazards, Solutions and Tools (2/5)
- Hazards, Solutions and Tools (3/5)
- Hazards, Solutions and Tools (4/5)
- Hazards, Solutions and Tools (5/5)
- Fighting Back (1/5)
- Fighting Back (2/5)
- Fighting Back (3/5)
- Fighting Back (4/5)
- Fighting Back (5/5)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Related Titles
Product information
- Title: Software Piracy Exposed
- Author(s):
- Release date: October 2005
- Publisher(s): Syngress
- ISBN: 9780080489735
You might also like
book
Solid Code: Optimizing the Software Development Life Cycle
Get best-in-class engineering practices to help you write more-robust, bug-free code. Two Microsoft .NET development experts …
book
The Art of Communication
Bring nuance, depth, and meaning to every conversation you have The Art of Communication is for …
audiobook
Fall in Love with the Problem, Not the Solution
Unicorns-companies that reach a valuation of more than $1 billion-are rare. Uri Levine has built two. …
video
Learn Flutter and Dart to Build iOS and Android Apps (2023)
What makes Flutter the best framework to build mobile apps? With Flutter, you can build mobile …