Cita APA (7a ed.)

Collberg, C., & Nagra, J. (2009). Surreptitious software: Obfuscation, watermarking, and tamperproofing for software protection (1st edition.). Addison-Wesley.

Cita Chicago Style (17a ed.)

Collberg, Christian, y Jasvir Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. 1st edition. Upper Saddle River, N.J.: Addison-Wesley, 2009.

Cita MLA (9a ed.)

Collberg, Christian, y Jasvir Nagra. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. 1st edition. Addison-Wesley, 2009.

Precaución: Estas citas no son 100% exactas.