Cargando…

Malicious cryptography : exposing cryptovirology /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Young, Adam, 1972- (Autor), Yung, Moti (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Indiana : Wiley Publishing, [2004]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn946596233
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160413s2004 inua ob 001 0 eng d
010 |z  2003023863 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d KSU  |d DEBBG  |d DEBSZ  |d OCLCA  |d COO  |d OCLCA  |d CEF  |d AU@  |d WYU  |d OCLCQ  |d UAB  |d OCLCO  |d VT2  |d OCLCO  |d INARC  |d OCLCQ  |d OCLCO 
019 |a 1153047306 
020 |z 9780764549755 
020 |a 9780764568466 
020 |a 0764568469 
020 |a 0764549758 
020 |a 9780764549755 
029 1 |a DEBBG  |b BV043968814 
029 1 |a DEBSZ  |b 485793253 
029 1 |a GBVCP  |b 882752448 
035 |a (OCoLC)946596233  |z (OCoLC)1153047306 
037 |a CL0500000731  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8/2  |2 22 
049 |a UAMI 
100 1 |a Young, Adam,  |d 1972-  |e author. 
245 1 0 |a Malicious cryptography :  |b exposing cryptovirology /  |c Adam Young, Moti Yung. 
264 4 |c ©2004 
264 1 |a Indianapolis, Indiana :  |b Wiley Publishing,  |c [2004] 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces of anonymity -- Cryptocounters -- Computationally secure information stealing -- Non-zero sum games and survivable malware -- Coping with malicious software -- The nature of Trojan horses -- Subliminal channels -- SETUP attack on factoring based key generation -- SETUP attacks on discrete-log cryptosystems. 
520 8 |a Annotation  |b Hackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker--as much an addict as the vacant-eyed denizen of the crackhouse--so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. <ul><li>Understand the mechanics of computationally secure information stealing</li><li>Learn how non-zero sum Game Theory is used to develop survivable malware</li><li>Discover how hackers use public key cryptography to mount extortion attacks</li><li>Recognize and combat the danger of kleptographic attacks on smart-card devices</li><li>Build a strong arsenal against a cryptovirology attack</li></ul> 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cryptography. 
650 0 |a Computer viruses  |x Prevention. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique. 
650 6 |a Cryptographie. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer security  |2 fast 
650 7 |a Computer viruses  |x Prevention  |2 fast 
650 7 |a Cryptography  |2 fast 
650 7 |a Data protection  |2 fast 
700 1 |a Yung, Moti,  |e author. 
776 0 8 |i Print version:  |a Young, Adam, 1972-  |t Malicious cryptography.  |d Hoboken, NJ : Wiley, ©2004  |z 0764549758  |w (DLC) 2003023863  |w (OCoLC)53330886 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780764568466/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Internet Archive  |b INAR  |n maliciouscryptog0000youn 
994 |a 92  |b IZTAP