|
|
libcats.org
Malicious Cryptography: Exposing CryptovirologyAdam Young, Moti Yung"Tomorrow's hackers may ransack the cryptographer's toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too.-Matthew Franklin, PhD Program Chair, Crypto 2004 WHAT IF HACKERS CONTROL THE WEAPONS USED TO FIGHT THEM? Hackers have unleashed the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cybercrime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. Cryptovirology seems like a futuristic fantasy, but be assured, the threat is ominously real. If you want to protect your data, your identity, and yourself, vigilance is essential-now. * Understand the mechanics of computationally secure information stealing* Learn how non-zero sum Game Theory is used to develop survivable malware* Discover how hackers use public key cryptography to mount extortion attacks* Recognize and combat the danger of kleptographic attacks on smart-card devices* Build a strong arsenal against a cryptovirology attackHackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
Heating versus Cooling in Galaxies and Clusters of Galaxies: Proceedings of the MPA/ESO/MPE/USM Joint Astronomy Conference held in Garching, Germany, 6-11 August 2006Автор: Hans Böhringer, Автор: Gabriel W. Pratt, Автор: Alexis Finoguenov, Автор: Peter Schuecker
Размер книги: 31.26 Mb
The Hilbert-Huang Transform and Its Applications (Interdisciplinary Mathematical Sciences)Автор: Norden E. Huang, Автор: Samuel S. Shen
Размер книги: 3.00 Mb
The Shadows of Total War: Europe, East Asia, and the United States, 1919-1939 (Publications of the German Historical Institute)Автор: Roger Chickering, Автор: Stig Forster
Размер книги: 1.76 Mb
Пособие по английскому языку для медицинских вузовАвтор: Маслова А. М., Автор: Вайнштейн З. И.Категория: Разное
Размер книги: 18.51 Mb
World History: Ideologies, Structures, and IdentitiesАвтор: Philip Pomper, Автор: Richard H. Elphick, Автор: Richard T. Vann
Размер книги: 25.16 Mb
Пётр III: Повествование в документах и версияхАвтор: Мыльников А.Категория: История Мемуары, Биографии
Размер книги: 27.51 Mb
|
|
|