pregleda

Malicious Cryptography : Exposing Cryptovirology


Cena:
1.795 din
Stanje: Nekorišćen
Garancija: Ne
Isporuka: Pošta
Lično preuzimanje
Plaćanje: Tekući račun (pre slanja)
Lično
Grad: Beograd-Mladenovac,
Beograd-Mladenovac
Prodavac

kukuruz (9086)

PREMIUM član
Član je postao Premium jer:
- ima 100 jedinstvenih pozitivnih ocena od kupaca,
- tokom perioda od 6 meseci uplati minimum 20.000 dinara na svoj Limundo račun.

100% pozitivnih ocena

Pozitivne: 38190

  Pošalji poruku

Svi predmeti člana


Kupindo zaštita

ISBN: 0764549758
Godina izdanja: 2004
Jezik: Engleski
Oblast: Internet
Autor: Strani

by Adam L. Young, Moti Yung

Wiley 2004 392 strane

odlična očuvanost


Foreword by Gus Simmons Acknowledgments Introduction Chapter 1. Through Hacker`s Eyes Chapter 2. Cryptovirology Chapter 3. Tools for Security and Insecurity Chapter 4. The Two Faces of Anonymity Chapter 5. Cryptocounters Chapter 6. Computationally Secure Information Stealing Chapter 7. Non-Zero Sum Games and Survivable Malware Chapter 8. Coping with Malicious Software Chapter 9. The Nature of Trojan Horses Chapter 10. Subliminal Channels Chapter 11. SETUP Attack on Factoring Based Key Generation Chapter 12. SETUP Attacks on Discrete-Log Cryptosystems Appendix A: Computer Virus Basics Appendix B: Notation and Other Background Information Appendix C: Public Key Cryptography in a Nutshell Glossary References Index

Cene su konačne!

Ne šaljem u inostranstvo!

Ne šaljem na Kosovo (tj. Pošta ne prima pošiljke za Kosovo).

Predmet: 82473513
by Adam L. Young, Moti Yung

Wiley 2004 392 strane

odlična očuvanost


Foreword by Gus Simmons Acknowledgments Introduction Chapter 1. Through Hacker`s Eyes Chapter 2. Cryptovirology Chapter 3. Tools for Security and Insecurity Chapter 4. The Two Faces of Anonymity Chapter 5. Cryptocounters Chapter 6. Computationally Secure Information Stealing Chapter 7. Non-Zero Sum Games and Survivable Malware Chapter 8. Coping with Malicious Software Chapter 9. The Nature of Trojan Horses Chapter 10. Subliminal Channels Chapter 11. SETUP Attack on Factoring Based Key Generation Chapter 12. SETUP Attacks on Discrete-Log Cryptosystems Appendix A: Computer Virus Basics Appendix B: Notation and Other Background Information Appendix C: Public Key Cryptography in a Nutshell Glossary References Index
82473513 Malicious Cryptography : Exposing Cryptovirology

LimundoGrad koristi kolačiće u statističke i marketinške svrhe. Nastavkom korišćenja sajta smatramo da ste pristali na upotrebu kolačića. Više informacija.