Malicious Cryptography : Exposing Cryptovirology


Adam. Young
Bok Engelsk 2004 · Electronic books.
Utgitt
Hoboken : : Wiley, , 2004.
Omfang
1 online resource (418 p.)
Opplysninger
Description based upon print version of record.. - Malicious Cryptography: Exposing Cryptovirology; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Through Hacker's Eyes; Chapter 2: Cryptovirology; Chapter 3: Tools for Security and Insecurity; Chapter 4: The Two Faces of Anonymity; Chapter 5: Cryptocounters; Chapter 6: Computationally Secure Information Stealing; Chapter 7: Non-Zero Sum Games and Survivable Malware; Chapter 8: Coping with Malicious Software; Chapter 9: The Nature of Trojan Horses; Chapter 10: Subliminal Channels; Chapter 11: SETUP Attack on Factoring Based Key Generation. - Chapter 12: SETUP Attacks on Discrete-Log CryptosystemsAppendix A: Computer Virus Basics; Appendix B: Notation and Other Background Information; Appendix C: Public Key Cryptography in a Nutshell; Glossary; References; Index. - Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize you
Emner
Sjanger
Dewey
ISBN
0764549758

Bibliotek som har denne