Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Cryptography: Exposing Cryptovirology

Buy
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack.

This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack
(HTML tags aren't allowed.)

Foundations of Python Network Programming: The comprehensive guide to building network applications with Python
Foundations of Python Network Programming: The comprehensive guide to building network applications with Python

This second edition of Foundations of Python Network Programming targets Python 2.5 through Python 2.7, the most popular production versions of the language. Python has made great strides since Apress released the first edition of this book back in the days of Python 2.3. The advances required new chapters to be written from the ground up,...

Software Development for the QUALCOMM BREW Platform
Software Development for the QUALCOMM BREW Platform

QUALCOMM Binary Runtime Environment for Wireless (BREW) is a development platform allowing software developers to create applications that operate on all handsets utilizing QUALCOMM CDMA chipsets. This cutting-edge book introduces BREW and describes differences from product competitors like J2ME, Palm OS, Symbian, and Pocket PC Phone...

Enterprise AJAX: Strategies for Building High Performance Web Applications
Enterprise AJAX: Strategies for Building High Performance Web Applications
If you are like many of the talented developers we meet, you’re interested in AJAX and how you can use it to improve your web applications. You may have even done some preliminary research online, checked out Ajaxian.com, or read a beginner’s book to AJAX development. If not, then you’re like an even larger group of talented...

Sams Teach Yourself iPad Application Development in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself iPad Application Development in 24 Hours (Sams Teach Yourself -- Hours)

“It’s just a big iPod Touch.”

Few words have puzzled me more during the weeks leading up to the iPad launch. Let’s break down exactly what it means to be a “big iPod Touch.”

First, it means a large, bright, colorful display, coupled with an amazingly thin enclosure and amazing battery...

Macromedia Flash MX 2004 for Rich Internet Applications
Macromedia Flash MX 2004 for Rich Internet Applications
The long-stale page metaphor for Web sites is finally dying out, replaced by the single-screen rich-Internet apps that Flash MX 2004 is at last bringing to the mainstream. To stay ahead of the curve--and to start creating the kind of Web sites you used to only dream of--you need this guide. In these pages you'll learn how to create the sites...
Introducing Microsoft  LINQ
Introducing Microsoft LINQ

Your first look at building data-rich applications using Microsoft LINQ.

Get a head start using Microsoft Language Integrated Query (LINQ). Two experienced developers give you advanced insights and expert guidance for using this unified model for data access. You will learn how to write queries in your native programming...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy