Malicious Cryptography

Malicious Cryptography
Author :
Publisher : John Wiley & Sons
Total Pages : 418
Release :
ISBN-10 : 9780764568466
ISBN-13 : 0764568469
Rating : 4/5 (66 Downloads)

Book Synopsis Malicious Cryptography by : Adam Young

Download or read book Malicious Cryptography written by Adam Young and published by John Wiley & Sons. This book was released on 2004-07-16 with total page 418 pages. Available in PDF, EPUB and Kindle. Book excerpt: Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack


Malicious Cryptography Related Books

Malicious Cryptography
Language: en
Pages: 418
Authors: Adam Young
Categories: Computers
Type: BOOK - Published: 2004-07-16 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s cal
Identifying Malicious Code Through Reverse Engineering
Language: en
Pages: 196
Authors: Abhishek Singh
Categories: Computers
Type: BOOK - Published: 2009-02-27 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology
Language: en
Pages: 572
Authors: Raphaël C.-W. Phan
Categories: Computers
Type: BOOK - Published: 2017-07-13 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur
Malware Detection
Language: en
Pages: 307
Authors: Mihai Christodorescu
Categories: Computers
Type: BOOK - Published: 2007-03-06 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based tec
Applied Cryptography and Network Security
Language: en
Pages: 524
Authors: Markus Jakobsson
Categories: Business & Economics
Type: BOOK - Published: 2004-06 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Conference on Applied Cryptography and Network Security, ACNS 2004, held in Yellow Mo