Book Details:
| Publisher: | Wiley |
| Series: |
Wiley
|
| Author: | Adam Young |
| Edition: | 1 |
| ISBN-10: | 0764549758 |
| ISBN-13: | 9780764549755 |
| Pages: | 416 |
| Published: | Feb 27 2004 |
| Posted: | Nov 19 2014 |
| Language: | English |
| Book format: | PDF |
| Book size: | 29.08 MB |
Book Description:
Hackers have uncovered the dark side of cryptographythat device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back.They will take you inside the brilliant and devious mind of a hackeras much an addict as the vacant-eyed denizen of the crackhouseso you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack.This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devicesBuild a strong arsenal against a cryptovirology attack
From Mischief to Malicious
A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..* From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security.* From Phishing Exposed, Lance Jame...
Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physic...
Fighting Malicious Code
Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jumpingoff point to spread to all of your buddies' computers; and steal files from your machine. Malicious code in the hands of a crafty attacker is indeed powerful. It's becoming even more of a problem because many of the very same factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. Specifically, malicious code writers benefit from the trends toward mixing static data and executable instruction...
2007 - 2021 © eBooks-IT.org