Wonder Club world wonders pyramid logo
×

Malicious Cryptography: Exposing Cryptovirology Book

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology has a rating of 3.5 stars
   2 Ratings
X
Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology
3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Malicious Cryptography: Exposing Cryptovirology
  • Written by author Adam Young
  • Published by Wiley, John & Sons, Incorporated, February 2004
  • Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means
  • Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data i
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Foreword
Acknowledgments
Introduction
1Through Hacker's Eyes1
2Cryptovirology33
3Tools for Security and Insecurity51
4The Two Faces of Anonymity89
5Cryptocounters103
6Computationally Secure Information Stealing113
7Non-Zero Sum Games and Survivable Malware147
8Coping with Malicious Software171
9The Nature of Trojan Horses201
10Subliminal Channels211
11SETUP Attack on Factoring Based Key Generation229
12SETUP Attacks on Discrete-Log Cryptosystems265
App. AComputer Virus Basics295
App. BNotation and Other Background Information307
App. CPublic Key Cryptography in a Nutshell321
Glossary347
References357
Index387


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology

X
WonderClub Home

This item is in your Collection

Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology

Malicious Cryptography: Exposing Cryptovirology

X
WonderClub Home

This Item is in Your Inventory

Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology

Malicious Cryptography: Exposing Cryptovirology

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: