Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Malicious cryptography : exposing cryptovirology
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Malicious cryptography : exposing cryptovirology

Malicious cryptography : exposing cryptovirology

Dr. Adam L. Young, Dr. Moti Yung

416 pages, parution le 10/03/2004

Résumé

Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack

Sommaire

  • Through Hacker's Eyes.
  • Cryptovirology.
  • Tools for Security and Insecurity.
  • The Two Faces of Anonymity.
  • Cryptocounters.
  • Computationally Secure Information Stealing.
  • Non-Zero Sum Games and Survivable Malware.
  • Coping with Malicious Software.
  • The Nature of Trojan Horses.
  • Subliminal Channels.
  • SETUP Attack on Factoring Based Key Generation.
  • SETUP Attacks on Discrete-Log Cryptosystems.
  • Appendix A: Computer Virus Basics.
  • Appendix B: Notation and Other Background Information.
  • Appendix C: Public Key Cryptography in a Nutshell.
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) Dr. Adam L. Young, Dr. Moti Yung
Parution 10/03/2004
Nb. de pages 416
Format 18,5 x 23,5
Couverture Broché
Poids 614g
Intérieur Noir et Blanc
EAN13 9780764549755
ISBN13 978-0-7645-4975-5

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription