9780764549755-0764549758-Malicious Cryptography: Exposing Crytovirology

Malicious Cryptography: Exposing Crytovirology

ISBN-13: 9780764549755
ISBN-10: 0764549758
Edition: 1
Author: Moti Yung, Adam Young
Publication date: 2010
Publisher: Wiley
Format: Paperback 418 pages
FREE US shipping

Book details

ISBN-13: 9780764549755
ISBN-10: 0764549758
Edition: 1
Author: Moti Yung, Adam Young
Publication date: 2010
Publisher: Wiley
Format: Paperback 418 pages

Summary

Malicious Cryptography: Exposing Crytovirology (ISBN-13: 9780764549755 and ISBN-10: 0764549758), written by authors Moti Yung, Adam Young, was published by Wiley in 2010. With an overall rating of 4.5 stars, it's a notable title among other Internet, Groupware, & Telecommunications (Networking & Cloud Computing, Hacking, Security & Encryption, Privacy & Online Safety) books. You can easily purchase or rent Malicious Cryptography: Exposing Crytovirology (Paperback) from BooksRun, along with many other new and used Internet, Groupware, & Telecommunications books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.32.

Description

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack.

This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book