Malicious Cryptography: Exposing Cryptovirology

本书深入探讨了黑客如何利用密码学进行犯罪活动,并介绍了如何防范这些威胁。读者将了解到计算安全信息窃取机制、非零和博弈理论在恶意软件开发中的应用、公钥加密勒索攻击及智能卡设备上 kleptographic 攻击的识别与对抗。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.youkuaiyun.com/topmvp - topmvp

Hackers have uncovered the dark side of cryptographythat device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. Its called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what youre up against and how to fight back.

They will take you inside the brilliant and devious mind of a hackeras much an addict as the vacant-eyed denizen of the crackhouseso you can feel the rush and recognize your opponents power. Then, they will arm you for the counterattack.

This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.
*Understand the mechanics of computationally secure information stealing
*Learn how non-zero sum Game Theory is used to develop survivable malware
*Discover how hackers use public key cryptography to mount extortion attacks
*Recognize and combat the danger of kleptographic attacks on smart-card devices
*Build a strong arsenal against a cryptovirology attack

http://rapidshare.com/files/50543136/0764549758.rar
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值