Encryption Software and Books Encryption Software and Books
   Home >  Encryption Software >  Books > Security and Encryption


Windows Utilities

Strong File(Folder) Encryption Decryption Utility: easily encrypt and decrypt your files and folders.

Encryption Software - Service Edition with Scheduling: allows you easily and quickly to run scheduled encryption and decryption sessions as a service process.

Auto FTP Premium: save time and money with automated ftp client software. Upload and download encrypted files and folders.




Bestselling and bargain books: Security and Encryption
* Search bestsellers
* Search bargain books
* Other books




   


Books -> Security and Encryption


Malicious Cryptography: Exposing Cryptovirology

by:
Young, Adam
Yung, Moti



Publisher:
Wiley
Published: February 16, 2004
ISBN: 0764549758
Format:Paperback
Pages:416


   Read More, Buy It

Book Description
Review
"The authors of this book explain these issues and how to fight against them." (Computer Law & Security Report, 1st September 2004) "The authors of this book explain these issues and how to fight against them." (Computer Law & Security Report, 1st September 2004)

Product Description:
Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack.

This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.

Understand the mechanics of computationally secure information stealing
Learn how non-zero sum Game Theory is used to develop survivable malware
Discover how hackers use public key cryptography to mount extortion attacks
Recognize and combat the danger of kleptographic attacks on smart-card devices
Build a strong arsenal against a cryptovirology attack


  Read More, Buy It




Copyright © 1996-2005 PrimaSoft PC, Inc. All rights reserved.