LEADER 01783nmm a2200421 u 4500
001 EB001932635
003 EBX01000000000000001095537
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0764549758 
020 |a 0764568469 
020 |a 9780764568466 
050 4 |a QA76.9.A25 
100 1 |a Young, Adam 
245 0 0 |a Malicious cryptography  |b exposing cryptovirology  |c Adam Young, Moti Yung 
260 |a Indianapolis, Indiana  |b Wiley Publishing  |c 2004 
300 |a 1 volume  |b illustrations 
505 0 |a Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces of anonymity -- Cryptocounters -- Computationally secure information stealing -- Non-zero sum games and survivable malware -- Coping with malicious software -- The nature of Trojan horses -- Subliminal channels -- SETUP attack on factoring based key generation -- SETUP attacks on discrete-log cryptosystems 
505 0 |a Includes bibliographical references and index 
653 |a Computer security 
653 |a Sécurité informatique 
653 |a Data protection / fast 
653 |a Computer viruses / Prevention 
653 |a Cryptography 
653 |a Cryptographie 
653 |a Data protection / http://id.loc.gov/authorities/subjects/sh85035859 
653 |a Computer viruses / Prevention / fast 
653 |a Computer security / fast 
653 |a Cryptography / fast 
653 |a Protection de l'information (Informatique) 
700 1 |a Yung, Moti  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780764549755 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780764568466/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8/2 
520 |a Annotation