𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols

✍ Scribed by Hosmer, Chet;Raggo, Michael T.;McGrew, Wesley


Publisher
Elsevier Inc.;Syngress
Year
2013;2012
Tongue
English
Series
ITPro collection
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Chapter 1 History of Secret Writing Chapter 2 Four Easy Data Hiding Exercises Chapter 3 Steganography Chapter 4 Multimedia Data Hiding Chapter 5 Data Hiding among Android Mobile Devices Chapter 6 Apple iOS Data Hiding Chapter 7 Operating System Data Hiding Chapter 8 Virtual Data Hiding Chapter 9 Data Hiding in Network Protocols Chapter 10 Forensics and Anti-Forensics Chapter 11 Mitigation Strategies Chapter 12 Futures

✦ Subjects


Protection de l'information (Informatique);Sécurité informatique;Computer security;Data protection;Livres électroniques;Sécurité informatique


πŸ“œ SIMILAR VOLUMES


Data hiding: Exposing concealed data in
✍ Michael T. Raggo, Chet Hosmer πŸ“‚ Library πŸ“… 2012 πŸ› Syngress 🌐 English

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques

Data hiding: Exposing concealed data in
✍ Michael T. Raggo, Chet Hosmer πŸ“‚ Library πŸ“… 2012 πŸ› Syngress 🌐 English

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques

Data Hiding: Exposing Concealed Data in
✍ Michael T. Raggo, Chet Hosmer πŸ“‚ Library πŸ“… 2012 πŸ› Syngress 🌐 English

<p>As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. <b><i>Data Hiding </i></b>provides an exploration into the present day and next generation of tool

Data Hiding: Exposing Concealed Data in
✍ Michael T. Raggo, Chet Hosmer πŸ“‚ Library πŸ“… 2012 πŸ› Syngress 🌐 English

<p>As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. <b><i>Data Hiding </i></b>provides an exploration into the present day and next generation of tool

Mobile Telecommunications Protocols For
✍ Anna Hac πŸ“‚ Library πŸ“… 2003 πŸ› J. Wiley 🌐 English

Mobile users are demanding fast and efficient ubiquitous connectivity supporting data applications. This connectivity has to be provided by various different networks and protocols which guarantee that mobile networks function efficiently, performing routing and handoff for mobile users.Hac proposes