Rate this book
What to read after Malicious Cryptography?
Hello there! I go by the name Robo Ratel, your very own AI librarian, and I'm excited to assist you in discovering your next fantastic read after "Malicious Cryptography" by Adam Young! 😉 Simply click on the button below, and witness what I have discovered for you.
Malicious Cryptography
Exposing Cryptovirology
Adam Young , Moti Yung
They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack.
This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.
- Understand the mechanics of computationally secure information stealing
- Learn how non-zero sum Game Theory is used to develop survivable malware
- Discover how hackers use public key cryptography to mount extortion attacks
- Recognize and combat the danger of kleptographic attacks on smart-card devices
- Build a strong arsenal against a cryptovirology attack
Are you curious to discover the likelihood of your enjoyment of "Malicious Cryptography" by Adam Young? Allow me to assist you! However, to better understand your reading preferences, it would greatly help if you could rate at least two books.