Malicious cryptography : (Record no. 1802)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 091122s2004 inua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2003023863
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780764549755
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u2735
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Young, Adam,
Dates associated with a name 1972-
9 (RLIN) 1613
245 10 - TITLE STATEMENT
Title Malicious cryptography :
Remainder of title exposing cryptovirology /
Statement of responsibility, etc. Adam Young, Moti Yung.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hoboken, NJ :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2004.
300 ## - PHYSICAL DESCRIPTION
Extent xxiv, 392 p. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 357-385) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword -- Acknowledgments -- Introduction -- 1 Through Hacker’s Eye -- 2 Cryptovirology -- 3 Tools for Security and Insecurity -- 4 The Two Faces of Anonymity -- 5 Cryptocounters -- 6 Computationally Secure Information Stealing -- 7 Non-Zero Sum Games and Survivable Malware -- 8 Coping with Malicious Software -- 9 The Nature of Trojan Horses -- 10 Subliminal Channels -- 11 SETUP Attack on Factoring Based Key Generation -- 12 SETUP Attacks on Discrete-Log Cryptosystems -- Appendix A: Computer Virus Basics -- Appendix B: Notation and Other Background Information -- Appendix C: Public Key Cryptography in a Nutshell -- Glossary -- References -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Hackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker--as much an addict as the vacant-eyed denizen of the crackhouse--so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 5114
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 378
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer viruses
General subdivision Prevention.
9 (RLIN) 5115
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 5116
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yung, Moti.
9 (RLIN) 5117
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.82 YO.M / 2004 004631 11/24/2019 1 11/24/2019 Books