Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Cryptography: Exposing Cryptovirology

Buy
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack.

This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack
(HTML tags aren't allowed.)

MDX Solutions: With Microsoft SQL Server Analysis Services 2005 and Hyperion Essbase
MDX Solutions: With Microsoft SQL Server Analysis Services 2005 and Hyperion Essbase
An updated version of the leading tutorial and reference on the MDX query language

Now in its second edition, this invaluable reference explains why MDX (MulitDimensional eXpressions) is the most widely accepted software used for dimensional application. You'll learn how to build effective multidimensional data...

Beginning C for Arduino, Second Edition: Learn C Programming for the Arduino
Beginning C for Arduino, Second Edition: Learn C Programming for the Arduino

Beginning C for Arduino, Second Edition is written for those who have no prior experience with microcontrollers or programming but would like to experiment and learn both. Updated with new projects and new boards, this book introduces you to the C programming language, reinforcing each programming structure with a simple...

Cisco: The Complete Reference
Cisco: The Complete Reference
The Definitive Reference for Mastering Cisco Technology

Get up to speed on Cisco-related hardware and technology with this dual-purpose resource. Providing you with both technical background as well as on-the-job information--including configuration notes and hands-on commands--this useful reference is truly comprehensive in coverage. From the...


Understanding and Deploying Ldap Directory Services
Understanding and Deploying Ldap Directory Services

This comprehensive tutorial provides the reader with a thorough treatment of LDAP directory services. Minimal knowledge of general networking and administration is assumed, making the material accessible to intermediate and advanced readers alike. Designed to meet multiple needs, the first part of the book presents a general overview...

Interconnect RC and Layout Extraction for VLSI
Interconnect RC and Layout Extraction for VLSI

This book provides detailed information on the interconnect RC and layout extraction in integrated circuit chips. The RC and layout extraction is a part of the job in the physical design and timing analysis for high-speed circuit design. The accuracy of interconnects RC model as well as the extracted device sizes from the physical layout are...

Common Lisp Recipes: A Problem-Solution Approach
Common Lisp Recipes: A Problem-Solution Approach

Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques and...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy