Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Апрель 2024    »
ПнВтСрЧтПтСбВс
1234567
891011121314
15161718192021
22232425262728
2930 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  Malicious Cryptography. Exposing Cryptovirology
    Категория: Компьютерная литература » Безопасность » Криптография
 
Malicious Cryptography. Exposing Cryptovirology title=
Автор: Adam Young, Moti Yung
Издательство: Wiley
Год издания: 2004
Количество страниц: 419
Язык: english
Формат: PDF
Размер: 29 Мб
Каталожный номер: 3303
Tomorrow's hackers may ransack the cryptographer's toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too." -Matthew Franklin, PhD Program Chair, Crypto 2004 WHAT IF HACKERS CONTROL THE WEAPONS USED TO FIGHT THEM? Hackers have unleashed the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cybercrime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. Cryptovirology seems like a futuristic fantasy, but be assured, the threat is ominous ly real. If you want to protect your data, your identity, and yourself, vigilance is essential-now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack
 

Похожие публикации:

  • Protect Yourself: Secret of Unarmed Defense
  • Guide to Elliptic Curve Cryptography
  • Cryptography and Network Security Principles and Practices
  • Hackers Beware
  • Cyber Adversary Characterization. Auditing the Hacker Mind
  • Inside the SPAM Cartel: Trade Secrets From the Dark Side
  • Modern Cryptography: Protect Your Data with Fast Block Ciphers
  • Stealing the Network: How to Own the Box
  • Google Hacking for Penetration Testers
  • Hack Proofing Your Web Applications



  •  
    Ссылки на файлообменные сервераРазмер архива в Mb
    http://rapidshare.de/files/16520343/Malicious_Cryptography.rar2.4

     
    Оцените эту публикацию!
     
    • 0
    Опубликовал: flashsoft | 26-03-2006, 00:00 | Просмотров: 1358   Комментарии (0)  Печать

     
      Информация  
     
    Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.

     
     

      Главная страница | Регистрация | Новое на сайте | Статистика |
     
    «Librus - Mountain of Knowledge»
    «Либрус - гора знаний» 2004-2020
    Design by Flashsoft © 2005-2020