Malicious Cryptography
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Malicious Cryptography

Exposing Cryptovirology
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780764568466
Veröffentl:
2004
Einband:
E-Book
Seiten:
416
Autor:
Adam Young
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Hackers have uncovered the dark side of cryptography that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker as much an addict as the vacant-eyed denizen of the crackhouse so you can feel the rush and recognize your opponent s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack
Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horses, viruses, password theftand other cyber-crime. It's called cryptovirology, the art ofturning the very methods designed to protect your data into a meansof subverting it. In this fascinating, disturbing volume, theexperts who first identified cryptovirology show you exactly whatyou're up against and how to fight back.They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack.This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now.* Understand the mechanics of computationally secure informationstealing* Learn how non-zero sum Game Theory is used to developsurvivable malware* Discover how hackers use public key cryptography to mountextortion attacks* Recognize and combat the danger of kleptographic attacks onsmart-card devices* Build a strong arsenal against a cryptovirology attack

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.