Publicado por Wiley & Sons, Incorporated, John, 2004
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: Better World Books, Mishawaka, IN, Estados Unidos de America
Condición: USED_VERYGOOD. Used book that is in excellent condition. May show signs of wear or have minor defects.
Publicado por Wiley, 2010
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: USED_GOOD. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.87.
Publicado por Wiley, 2010
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: ThriftBooks-Phoenix, Phoenix, AZ, Estados Unidos de America
Paperback. Condición: USED_GOOD. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.87.
Publicado por Wiley, 2010
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: USED_GOOD. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.87.
Publicado por Wiley, New York, 2004
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: Alien Bindings, BALTIMORE, MD, Estados Unidos de America
Original o primera edición
Softcover. Condición: USED_FINE. No Jacket. First Edition. First Edition 1st printing in Very Good+ or Fine condition. The covers are in great shape with only a hint of shelf wear. The binding is square and tight. The interior pages are clean and unmarked. The book will be carefully packaged for shipment for protection from the elements. USPS electronic tracking number issued free of charge. Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker-as much an addict as the vacant-eyed denizen of the crackhouse-so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing. Learn how non-zero sum Game Theory is used to develop survivable malware. Discover how hackers use public key cryptography to mount extortion attacks. Recognize and combat the danger of kleptographic attacks on smart-card devices. Build a strong arsenal against a cryptovirology attack.
Publicado por Wiley Publishing, USA, 2004
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: Librería Antonio Azorín, San Lorenzo de El Escorial, M, España
Rústica. Condición: NEW. Ejemplar nuevo. New. What if Hackers control the weapons used to fight them?.
Publicado por Wiley, 2010
ISBN 10: 0764549758 ISBN 13: 9780764549755
Librería: Pieuler Store, Suffolk, Reino Unido
Condición: USED_GOOD. 100% Customer Satisfaction Guaranteed ! The book shows some signs of wear from use but is a good readable copy. Cover in excellent condition. Binding tight. Pages in great shape, no tears. Not contain access codes, cd, DVD.
Publicado por Alan Young, 2015
ISBN 10: 1507723172 ISBN 13: 9781507723173
Librería: C.P. Collins Booksellers, Leichhardt, NSW, Australia
Wrappers. Condición: USED_NEARFINE. (385pp). Illustrated. Clean unused Size: Large octavo. Paperback.