Introduction to Digital Rights Management (DRM); Identifying, Tracking, Authorizing and Restricting Access to Digital Media (Paperback)
Mr. Lawrence Harte
- 出版商: Althos
- 出版日期: 2006-08-16
- 售價: $990
- 貴賓價: 9.5 折 $941
- 語言: 英文
- 頁數: 98
- 裝訂: Paperback
- ISBN: 1932813403
- ISBN-13: 9781932813401
無法訂購
買這商品的人也買了...
-
$1,080Windows System Programming, 3/e (Hardcover)
-
$880$695 -
$550$468 -
$580$458 -
$580$458 -
$990$891 -
$1,188Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816), 3/e
-
$980$774 -
$620$527 -
$800$632 -
$750$593 -
$780$663 -
$680$578 -
$580$493 -
$550$429 -
$390$308 -
$750$638 -
$520$442 -
$530$199 -
$400$316 -
$399Handcrafted CSS: More Bulletproof Web Design, Video Edition (Paperback)
-
$820$648 -
$580$493 -
$890$757 -
$490$417
相關主題
商品描述
This book explains the fundamentals of digital rights management systems including identifying, tracking, authorizing and restricting access to digital media. You will learn how DRM systems help to protect and enforce copyrights, patents, trademarks, and other forms of intellectual property. Digital assets can take various forms including audio, data and digital video. You will discover how it is possible to provide simple access to authorized users (paying customers) and how to restrict access to unauthorized users. Digital media content must be uniquely identified. The common identification codes that may be assigned to digital media include ISBN (books), ISSN (magazines), DOI (multimedia) and watermarks. You will learn that DRM systems may include a DRM controller, digital asset manager and DRM packager that allow DRM systems to receive requests for digital assets, to find and retrieve the assets and to packages (encode) to protect the assets during delivery and use. Digital assets can be monitored and tracked using a variety of information including their distribution addresses (IP address) and through unique identifying characteristics of the digital media such as the use of digital watermarks. Protocols and standards can be used to define rights elements of digital media and services. Some of the DRM languages covered in this book include XrML, SDMI, XCML, ORDL, RDF, REL and others. You will discover how authentication works without the need to transfer secret keys through communication systems. The basic encryption processes are described along with introduction on some of the ways to use and implement encryption. The common DRM threats including hacking and ripping methods are explained along with ways to reduce the risk of decoding and copying of digital media by unauthorized people. Some of the most important topics featured are: . Fundamentals of DRM Systems . Copyright, Patents, Trademarks and Intellectual Property . Audio, Data and Video Digital Assets . Media Identification Options . Digital Content Distribution . Managing, Tracking and Restricting Digital assets . Tracking and Digital Watermarks . Protocols and Standards . Authentication and Encryption . Common Hacking Methods