
×
„The authors of this book explain these issues and how to fight against them.“ (Computer Law & Security Report, 1st September 2004)
Hackers have uncovered the dark side of cryptography--thatdevice developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art ofturning the very methods designed to protect your data into a meansof subverting it. In this fascinating, disturbing volume, theexperts who first identified cryptovirology show you exactly whatyou're up against and how to fight back.
They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack.
This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now.
* Understand the mechanics of computationally secure informationstealing
* Learn how non-zero sum Game Theory is used to developsurvivable malware
* Discover how hackers use public key cryptography to mountextortion attacks
* Recognize and combat the danger of kleptographic attacks onsmart-card devices
* Build a strong arsenal against a cryptovirology attack
They will take you inside the brilliant and devious mind of ahacker--as much an addict as the vacant-eyed denizen of thecrackhouse--so you can feel the rush and recognize youropponent's power. Then, they will arm you for thecounterattack.
This book reads like a futuristic fantasy, but be assured, thethreat is ominously real. Vigilance is essential, now.
* Understand the mechanics of computationally secure informationstealing
* Learn how non-zero sum Game Theory is used to developsurvivable malware
* Discover how hackers use public key cryptography to mountextortion attacks
* Recognize and combat the danger of kleptographic attacks onsmart-card devices
* Build a strong arsenal against a cryptovirology attack