As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
β Scribed by Hosmer, Chet;Raggo, Michael T.;McGrew, Wesley
- Publisher
- Elsevier Inc.;Syngress
- Year
- 2013;2012
- Tongue
- English
- Series
- ITPro collection
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Chapter 1 History of Secret Writing Chapter 2 Four Easy Data Hiding Exercises Chapter 3 Steganography Chapter 4 Multimedia Data Hiding Chapter 5 Data Hiding among Android Mobile Devices Chapter 6 Apple iOS Data Hiding Chapter 7 Operating System Data Hiding Chapter 8 Virtual Data Hiding Chapter 9 Data Hiding in Network Protocols Chapter 10 Forensics and Anti-Forensics Chapter 11 Mitigation Strategies Chapter 12 Futures
β¦ Subjects
Protection de l'information (Informatique);SΓ©curitΓ© informatique;Computer security;Data protection;Livres Γ©lectroniques;SeΜcuriteΜ informatique
π SIMILAR VOLUMES
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques
<p>As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. <b><i>Data Hiding </i></b>provides an exploration into the present day and next generation of tool
<p>As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. <b><i>Data Hiding </i></b>provides an exploration into the present day and next generation of tool
Mobile users are demanding fast and efficient ubiquitous connectivity supporting data applications. This connectivity has to be provided by various different networks and protocols which guarantee that mobile networks function efficiently, performing routing and handoff for mobile users.Hac proposes