The Software IP Detective's Handbook : Measurement, Comparison, and Infringement Detection

個数:

The Software IP Detective's Handbook : Measurement, Comparison, and Infringement Detection

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 450 p.
  • 言語 ENG
  • 商品コード 9780137035335
  • DDC分類 346.048

Full Description


"Intellectual property, software plagiarism, patents, and copyrights are complicated subjects. This book explains the key elements better than anything else I have seen. I highly recommend it to anyone who develops software or needs to protect proprietary software algorithms, and to all attorneys involved with IP litigation."-Capers Jones, President, Capers Jones & Associates LLC"Intellectual property is an engine of growth for our high tech world and a valuable commodity traded in its own right. Bob Zeidman is a leading authority on software intellectual property, and in this book he shares his expertise with us. The book is comprehensive. It contains clear explanations of many difficult subjects. Business people who study it will learn how to protect their IP. Lawyers will use it to understand the specifics of how software embodies IP. Judges will cite it in their decisions on IP litigation."-Abraham Sofaer, George P. Shultz Senior Fellow in Foreign Policy and National Security Affairs, Hoover Institution, Stanford UniversityThe Definitive Software IP Guide for Developers, Managers, Entrepreneurs, Attorneys, and ConsultantsIn The Software IP Detective's Handbook, pioneering expert Bob Zeidman-creator of CodeSuite (R), the world's #1 software IP analysis tool-thoroughly covers all technical and legal aspects of IP theft detection. Using his rigorous framework and practical examples, you can accurately determine whether software copying, theft, or infringement has occurred, and fully support your findings in any venue. This book will help you Understand the key concepts that underlie software IP analysis Compare and correlate source code for signs of theft or infringement Uncover signs of copying in object code when source code is inaccessible Track malware and third-party code in applications Use software clean rooms to avoid IP infringement Understand IP issues associated with open source and DMCA Visit www.SAFE-corp.biz to download a free trial version of CodeSuite (R), the #1 tool for detecting software copying.

Contents

Preface xxiAcknowledgments xxiiiAbout the Author xxvPart I: Introduction 1Objectives 2Intended Audience 2Chapter 1: About this Book 5Part I: Introduction 6Part II: Software 6Part III: Intellectual Property 6Part IV: Source Code Differentiation 9Part V: Source Code Correlation 9Part VI: Object and Source/Object Code Correlation 10Part VII: Source Code Cross-Correlation 10Part VIII: Detecting Software IP Theft and Infringement 11Part IX: Miscellaneous Topics 11Part X: Past, Present, and Future 11Chapter 2: Intellectual Property Crime 132.1 The Extent of IP Theft 14Part II: Software 21Objectives 22Intended Audience 22Chapter 3: Source Code 233.1 Programming Languages 243.2 Functions, Methods, Procedures, Routines, and Subroutines 263.3 Files 323.4 Programs 353.5 Executing Source Code 36Chapter 4: Object Code and Assembly Code 394.1 Object Code 394.2 Assembly Code 404.3 Files 434.4 Programs 44Chapter 5: Scripts, Intermediate Code, Macros, and Synthesis Primitives 455.1 Scripts 455.2 Intermediate Code 475.3 Macros 485.4 Synthesis Primitives 49Part III: Intellectual Property 53Objectives 55Intended Audience 55Chapter 6: Copyrights 576.1 The History of Copyrights 576.2 Copyright Protections 606.3 Software Copyrights 636.4 Allowable and Nonallowable Uses of Copyrighted Code 72Chapter 7: Patents 797.1 The History of Patents 807.2 Types of Patents 817.3 Parts of a Patent 827.4 Patenting an Invention 857.5 Special Types of Patent Applications 867.6 Software Patents 907.7 Software Patent Controversy 917.8 Patent Infringement 957.9 NPEs and Trolls 99Chapter 8: Trade Secrets 1038.1 The History of Trade Secrets 1038.2 Uniform Trade Secrets Act (UTSA) 1048.3 Economic Espionage Act 1058.4 Aspects of a Trade Secret 1068.5 Trade Secret Theft 1118.6 Patent or Trade Secret? 112Chapter 9: Software Forensics 1139.1 Forensic Science 1159.2 Forensic Engineering 1169.3 Digital Forensics 1199.4 Software Forensics 1209.5 Thoughts on Requirements for Testifying 121Part IV: Source Code Differentiation 125Objectives 126Intended Audience 126Chapter 10: Theory 12710.1 Diff 12810.2 Differentiation 13310.3 Types of Similarity 13510.4 Measuring Similar Lines 13610.5 Measuring File Similarity 14010.6 Measuring Similar Programs 142Chapter 11: Implementation 14711.1 Creating and Comparing Arrays 14711.2 Number of Optimal Match Score Combinations 15111.3 Choosing Optimal Match Scores for Calculating File Similarity 15311.4 Choosing File Similarity Scores for Reporting Program Similarity 161Chapter 12: Applications 16512.1 Finding Similar Code 16512.2 Measuring Source Code Evolution 168Part V: Source Code Correlation 183Objectives 185Intended Audience 185Chapter 13: Software Plagiarism Detection 18713.1 The History of Plagiarism Detection 18713.2 Problems with Previous Algorithms 18913.3 Requirements for Good Algorithms 192Chapter 14: Source Code Characterization 19714.1 Statements 19914.2 Comments 20614.3 Strings 207Chapter 15: Theory 20915.1 Practical Definition 21015.2 Comparing Different Programming Languages 21315.3 Mathematical Definitions 21415.4 Source Code Correlation Mathematics 21515.5 Source Code Examples 21615.6 Unique Elements 21815.7 Statement Correlation 21915.8 Comment/String Correlation 22315.9 Identifier Correlation 22515.10 Instruction Sequence Correlation 22715.11 Overall Correlation 228Chapter 16: Implementation 23316.1 Creating Arrays from Source Code 23416.2 Statement Correlation 23916.3 Comment/String Correlation 24016.4 Identifier Correlation 24116.5 Instruction Sequence Correlation 24316.6 Overall Correlation 24516.7 Comparing Programs in Different Programming Languages 24616.8 Comparing Sections of Code Other than Files 246Chapter 17: Applications 24717.1 Functional Correlation 24817.2 Identifying Authorship 24917.3 Identifying Origin 25117.4 Detecting Copyright Infringement (Plagiarism) 25217.5 Detecting Trade Secret Theft 25217.6 Locating Third-Party Code (Open Source) 25317.7 Compiler Optimization 25417.8 Refactoring 25417.9 Detecting Patent Infringement 255Part VI: Object and Source/Object Code Correlation 257Objectives 258Intended Audience 259Chapter 18: Theory 26118.1 Practical Definition 26618.2 Extracting Elements 26818.3 Comparing Different Programming Languages 27018.4 Mathematical Definitions 27018.5 Object and Source/Object Code Correlation Mathematics 27218.6 Comment/String Correlation 27318.7 Identifier Correlation 27418.8 Overall Correlation 27518.9 False Negatives 276Chapter 19: Implementation 27919.1 Creating Text Substring Arrays from Object Code 27919.2 Creating Arrays from Source Code 28319.3 Identifier Correlation 28719.4 Comment/String Correlation 28719.5 Overall Correlation 287Chapter 20: Applications 28920.1 Pre-Litigation Detective Work 28920.2 Tracking Malware 29320.3 Locating Third-Party Code 29320.4 Detecting Open Source Code License Violations 294Part VII: Source Code Cross-Correlation 295Objectives 296Intended Audience 296Chapter 21: Theory, Implementation, and Applications 29921.1 Comparing Different Programming Languages 30021.2 Mathematical Definitions 30021.3 Source Code Cross-Correlation Mathematics 30121.4 Source Code Examples 30321.5 Statement-to-Comment/String Correlation 30721.6 Comment/String-to-Statement Correlation 30821.7 Overall Correlation 30821.8 Implementation and Applications 310Part VIII: Detecting Software IP Theft and Infringement 313Objectives 315Intended Audience 315Chapter 22: Detecting Copyright Infringement 31722.1 Reasons for Correlation 31822.2 Steps to Find Correlation Due to Copying 32622.3 Abstraction Filtration Comparison Test 33122.4 Copyright Infringement Checklist 338Chapter 23: Detecting Patent Infringement 34123.1 Interpreting the Claims 34123.2 Examining the Software 34823.3 Tools 35023.4 Determining Patent Validity 352Chapter 24: Detecting Trade Secret Theft 35924.1 Identifying Trade Secrets 36024.2 Tools 367Part IX: Miscellaneous Topics 369Objectives 370Intended Audience 370Chapter 25: Implementing a Software Clean Room 37125.1 Background 37225.2 The Setup 37425.3 The Procedure 376Chapter 26: Open Source Software 38326.1 Definition 38326.2 Free Software 38626.3 Open Source Licenses 38826.4 Open Source Lawsuits 39026.5 The Pervasiveness of Open Source Software 396Chapter 27: Digital Millennium Copyright Act 39927.1 What Is the DMCA? 39927.2 For and Against the DMCA 40027.3 Noteworthy Lawsuits 403Part X: Conclusion: Past, Present, and Future 407Glossary 409References 423Index 435

最近チェックした商品