Steganography
Managing Information Goods 4. Rights Management 5. Recognizing Lock-In 6. Managing Lock-In.
THE STRATEGY BEHIND BREAKING INTO AND DEFENDING