Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques...
Saved in:
| Main Author: | Raggo, Michael T. |
|---|---|
| Other Authors: | Hosmer, Chet, McGrew, Wesley |
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
c2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Information protection playbook
Published: (2013)
Published: (2013)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Computer and intrusion forensics
Published: (2003)
Published: (2003)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published: (2009)
Published: (2009)
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Oracle incident response and forensics preparing for and responding to data breaches
by: Finnigan, Pete
Published: (2018)
by: Finnigan, Pete
Published: (2018)
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)
Published: (2021)
Digital identity management
Published: (2015)
Published: (2015)
Data science for cyber-security
Published: (2019)
Published: (2019)
Improving information security practices through computational intelligence
Published: (2016)
Published: (2016)
Information security management handbook, 2008 CD-ROM edition
Multimedia forensics and security
Published: (2009)
Published: (2009)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Digital rights management an introduction
Published: (2010)
Published: (2010)
The Chief Data Officer's playbook
by: Carruthers, Caroline, et al.
Published: (2018)
by: Carruthers, Caroline, et al.
Published: (2018)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Digital watermarking and steganography
by: Cox, Ingemar J.
Published: (2008)
by: Cox, Ingemar J.
Published: (2008)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Data analytics models and algorithms for intelligent data analysis
by: Runkler, Thomas A.
Published: (2020)
by: Runkler, Thomas A.
Published: (2020)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Fundamentals of networking and data communications
by: White, Curt M.
Published: (2013)
by: White, Curt M.
Published: (2013)
Information Security Management Handbook
Published: (2012)
Published: (2012)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Similar Items
-
Information hiding techniques for steganography and digital watermarking
by: lh -
Principles of information security
by: Whitman, Michael E
Published: (2003) -
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020) -
Security in computing
by: Pfleegar, Charles P.
Published: (1997) -
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)


