Von dem Buch Malicious Cryptography haben wir 2 gleiche oder sehr ähnliche Ausgaben identifiziert!
Falls Sie nur an einem bestimmten Exempar interessiert sind, können Sie aus der folgenden Liste jenes wählen, an dem Sie interessiert sind:
100%: Adam Young; Moti Yung: Malicious Cryptography (ISBN: 9780764568466) 2004, in Englisch, auch als eBook.
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
63%: Adam Young/ Moti Yung/ Robert Young: Malicious Cryptography (ISBN: 9780764549755) in Englisch, auch als eBook.
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Malicious Cryptography - 3 Angebote vergleichen
Bester Preis: € 30,99 (vom 06.06.2016)1
Malicious Cryptography (2004)
~EN NW EB
ISBN: 9780764568466 bzw. 0764568469, vermutlich in Englisch, John Wiley & Sons, Inc. neu, E-Book.
Lieferung aus: Deutschland, Sofort per Download lieferbar.
Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horses, viruses, password theft,and other cyber-crime. It's called cryptovirology, the art ofturning the very methods designed to protect your data into a meansof subverting it. In this fascinating, disturbing volume, theexperts who first identified cryptovirology show you exactly whatyou're up against and how to fight back. They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack. This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now. * Understand the mechanics of computationally secure informationstealing * Learn how non-zero sum Game Theory is used to developsurvivable malware * Discover how hackers use public key cryptography to mountextortion attacks * Recognize and combat the danger of kleptographic attacks onsmart-card devices * Build a strong arsenal against a cryptovirology attack, PDF, 16.07.2004.
Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horses, viruses, password theft,and other cyber-crime. It's called cryptovirology, the art ofturning the very methods designed to protect your data into a meansof subverting it. In this fascinating, disturbing volume, theexperts who first identified cryptovirology show you exactly whatyou're up against and how to fight back. They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack. This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now. * Understand the mechanics of computationally secure informationstealing * Learn how non-zero sum Game Theory is used to developsurvivable malware * Discover how hackers use public key cryptography to mountextortion attacks * Recognize and combat the danger of kleptographic attacks onsmart-card devices * Build a strong arsenal against a cryptovirology attack, PDF, 16.07.2004.
2
Malicious Cryptography
DE NW EB
ISBN: 9780764568466 bzw. 0764568469, in Deutsch, IDG Books Worldwide, Vereinigte Staaten von Amerika, neu, E-Book.
Lieferung aus: Deutschland, zzgl. Versandkosten, Sofort per Download lieferbar.
Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horses, viruses, password theft,and other cyber-crime. It's called cryptovirology, the art ofturning the very methods designed to protect your data into a meansof subverting it. In this fascinating, disturbing volume, theexperts who first identified cryptovirology show you exactly whatyou're up against and how to fight back. They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack. This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now. * Understand the mechanics of computationally secure informationstealing * Learn how non-zero sum Game Theory is used to developsurvivable malware * Discover how hackers use public key cryptography to mountextortion attacks * Recognize and combat the danger of kleptographic attacks onsmart-card devices * Build a strong arsenal against a cryptovirology attack.
Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horses, viruses, password theft,and other cyber-crime. It's called cryptovirology, the art ofturning the very methods designed to protect your data into a meansof subverting it. In this fascinating, disturbing volume, theexperts who first identified cryptovirology show you exactly whatyou're up against and how to fight back. They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack. This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now. * Understand the mechanics of computationally secure informationstealing * Learn how non-zero sum Game Theory is used to developsurvivable malware * Discover how hackers use public key cryptography to mountextortion attacks * Recognize and combat the danger of kleptographic attacks onsmart-card devices * Build a strong arsenal against a cryptovirology attack.
Lade…