Sold Out
Book Categories |
Foreword | ||
Acknowledgments | ||
Introduction | ||
1 | Through Hacker's Eyes | 1 |
2 | Cryptovirology | 33 |
3 | Tools for Security and Insecurity | 51 |
4 | The Two Faces of Anonymity | 89 |
5 | Cryptocounters | 103 |
6 | Computationally Secure Information Stealing | 113 |
7 | Non-Zero Sum Games and Survivable Malware | 147 |
8 | Coping with Malicious Software | 171 |
9 | The Nature of Trojan Horses | 201 |
10 | Subliminal Channels | 211 |
11 | SETUP Attack on Factoring Based Key Generation | 229 |
12 | SETUP Attacks on Discrete-Log Cryptosystems | 265 |
App. A | Computer Virus Basics | 295 |
App. B | Notation and Other Background Information | 307 |
App. C | Public Key Cryptography in a Nutshell | 321 |
Glossary | 347 | |
References | 357 | |
Index | 387 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionMalicious Cryptography: Exposing Cryptovirology
X
This Item is in Your InventoryMalicious Cryptography: Exposing Cryptovirology
X
You must be logged in to review the productsX
X
X
Add Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology to the inventory that you are selling on WonderClubX
X
Add Malicious Cryptography: Exposing Cryptovirology, Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means , Malicious Cryptography: Exposing Cryptovirology to your collection on WonderClub |