CD Cracking Uncovered: Protection Against Unsanctioned CD Copying | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
by Kris Kaspersky | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A-List 2004 (300 pages) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
ISBN:1931769338 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Aimed at shareware and commercial software programmers, as well as users interested in CD protection, this book will help readers defeat hackers and crackers who try to copy CDs without authorization. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Table of Contents | |||
CD Cracking Uncovered ”Protection against Unsanctioned CD Copying | |||
Preface | |||
Introduction | |||
On the CD | |||
Part I - CD Anathomy | |||
Chapter 1 | - | CD Organization | |
Chapter 2 | - | Power of Reed-Solomon Codes | |
Part II - Low-Level Control over Hardware | |||
Chapter 3 | - | Practical Advice on Urgent System Recovery | |
Chapter 4 | - | Interfaces for Interaction with the Hardware | |
Chapter 5 | - | Methods of Revealing Protection Mechanisms | |
Part III - Protection against Unauthorized Copying and Data Recovery | |||
Chapter 6 | - | Anti-Copying Mechanisms | |
Chapter 7 | - | Protection Mechanisms for Preventing Playback in PC CD-ROM | |
Chapter 8 | - | Protection against File-by-File Disc Copying | |
Chapter 9 | - | Protection Mechanisms Based on Binding to Storage Media | |
Chapter 10 | - | Data Recovery from CDs | |
List of Figures | |||
List of Tables | |||
List of Code Examples | |||
CD Content |