Statements (18)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:book
|
gptkbp:author |
gptkb:Adam_Young
gptkb:Moti_Yung |
gptkbp:country |
gptkb:United_States
|
gptkbp:genre |
non-fiction
|
https://www.w3.org/2000/01/rdf-schema#label |
Malicious Cryptography
|
gptkbp:ISBN |
978-0764549755
|
gptkbp:language |
English
|
gptkbp:mediaType |
gptkb:print
|
gptkbp:notableFor |
exploring the use of cryptography in malware and attacks
|
gptkbp:pages |
512
|
gptkbp:publicationDate |
2004
|
gptkbp:publisher |
gptkb:Wiley
|
gptkbp:subject |
computer security
cryptography malware |
gptkbp:bfsParent |
gptkb:Adam_L._Young
|
gptkbp:bfsLayer |
6
|