|
|
|
|
LEADER |
01783nmm a2200421 u 4500 |
001 |
EB001932635 |
003 |
EBX01000000000000001095537 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0764549758
|
020 |
|
|
|a 0764568469
|
020 |
|
|
|a 9780764568466
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Young, Adam
|
245 |
0 |
0 |
|a Malicious cryptography
|b exposing cryptovirology
|c Adam Young, Moti Yung
|
260 |
|
|
|a Indianapolis, Indiana
|b Wiley Publishing
|c 2004
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces of anonymity -- Cryptocounters -- Computationally secure information stealing -- Non-zero sum games and survivable malware -- Coping with malicious software -- The nature of Trojan horses -- Subliminal channels -- SETUP attack on factoring based key generation -- SETUP attacks on discrete-log cryptosystems
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Data protection / fast
|
653 |
|
|
|a Computer viruses / Prevention
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Cryptographie
|
653 |
|
|
|a Data protection / http://id.loc.gov/authorities/subjects/sh85035859
|
653 |
|
|
|a Computer viruses / Prevention / fast
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Cryptography / fast
|
653 |
|
|
|a Protection de l'information (Informatique)
|
700 |
1 |
|
|a Yung, Moti
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9780764549755
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780764568466/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8/2
|
520 |
|
|
|a Annotation
|