Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.

Malicious Cryptography - Exposing Cryptovirology[BBS]

Infohash:

638BAF829395BDEE8FC9B2A35A645127D49709DB

Type:

Other

Title:

Malicious Cryptography - Exposing Cryptovirology[BBS]

Category:

Other/E-books

Uploaded:

2011-08-19 (by bigbluesea)

Description:

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. * Understand the mechanics of computationally secure information stealing * Learn how non-zero sum Game Theory is used to develop survivable malware * Discover how hackers use public key cryptography to mount extortion attacks * Recognize and combat the danger of kleptographic attacks on smart-card devices * Build a strong arsenal against a cryptovirology attack # Paperback: 416 pages # Publisher: Wiley; 1 edition (February 27, 2004) # Language: English # ISBN-10: 0764549758 # ISBN-13: 978-0764549755

Tags:

  1. Malicious Cryptography
  2. Cryptovirology
  3. Pdf

Files count:

1

Size:

29.06 Mb

Trackers:

udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969

Files:

1. Malicious Cryptography - Exposing Cryptovirology - A. Young, M. Yung (Wiley, 2004) WW.pdf 29.06 Mb