Back to Search
ISBN 9780764549755 is out of print and is currently unavailable, alternate formats (if applicable) are shown below.
Available options are listed below:

Malicious Cryptography: Exposing Cryptovirology (Out of print)

AUTHOR Young, Robert; Yung, Moti; Young, Adam
PUBLISHER Wiley (02/27/2004)
PRODUCT TYPE Paperback (Paperback)

Description
"Tomorrow's hackers may ransack the cryptographer's toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too."
-Matthew Franklin, PhD Program Chair, Crypto 2004

WHAT IF HACKERS CONTROL THE WEAPONS USED TO FIGHT THEM?

Hackers have unleashed the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cybercrime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack.

Cryptovirology seems like a futuristic fantasy, but be assured, the threat is ominous ly real. If you want to protect your data, your identity, and yourself, vigilance is essential-now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack
Show More
Product Format
Product Details
ISBN-13: 9780764549755
ISBN-10: 0764549758
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 416
Carton Quantity: 10
Product Dimensions: 7.38 x 0.87 x 9.26 inches
Weight: 1.34 pound(s)
Feature Codes: Bibliography, Index, Price on Product, Glossary
Country of Origin: US
Subject Information
BISAC Categories
Computers | Internet - Online Safety & Privacy
Computers | Security - General
Dewey Decimal: 005.82
Library of Congress Control Number: 2003023863
Descriptions, Reviews, Etc.
jacket back
"Tomorrow's hackers may ransack the cryptographer's toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too."
-Matthew Franklin, PhD Program Chair, Crypto 2004

WHAT IF HACKERS CONTROL THE WEAPONS USED TO FIGHT THEM?

Hackers have unleashed the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cybercrime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack.

Cryptovirology seems like a futuristic fantasy, but be assured, the threat is ominous ly real. If you want to protect your data, your identity, and yourself, vigilance is essential-now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack
Show More
List Price $45.00
Your Price  $44.55
Paperback