Asia Pacific University Library catalogue


Disappearing cryptography : information hiding : steganography & watermarking / Peter Wayner.

By: Wayner, Peter, 1964-Material type: TextTextPublication details: Amsterdam ; Boston : Morgan Kaufmann Publishers, c2009Edition: 3rd edDescription: xv, 439 p. : ill. ; 24 cmISBN: 9780123744791 (pbk.)Subject(s): Computer networks -- Security measures | Cryptography | InternetDDC classification: 005.82 LOC classification: TK5105.59 | .W39 2009
Contents:
Framing information -- Encryption -- Error correction -- Secret sharing -- Compression -- Basic mimicry -- Grammars and mimicry -- Turing and reverse -- Life in the noise -- Anonymous remailers -- Secret broadcasts -- Keys -- Ordering and reordering -- Spreading -- Synthetic worlds -- Watermarks -- Steganalysis -- Obfuscation -- Synchronization -- Translucent databases -- Plain sight -- Coda.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
General Circulation General Circulation APIIT Library
Open Shelf APIIT
Book TK5105.59 .W39 2009 c.3 (Browse shelf (Opens below)) 3 Available (No use restrictions) 00007461
General Circulation General Circulation APU Library
Open Shelf
Book TK5105.59 .W39 2009 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00007459
General Circulation General Circulation APU Library
Open Shelf
Book TK5105.59 .W39 2009 c.2 (Browse shelf (Opens below)) 2 Available (No use restrictions) 00007460
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
TK5105.59 .V46 2009 c.2 Security solutions for cyber-physical systems / TK5105.59 .W33 2000 c.1 The process of network security : TK5105.59 .W38 2008 c.1 CCNA security official exam certification guide / TK5105.59 .W39 2009 c.1 Disappearing cryptography : TK5105.59 .W39 2009 c.2 Disappearing cryptography : TK5105.59 .W43 2008 c.1 Guide to tactical perimeter defense : TK5105.59 .W43 2008 c.2 Guide to tactical perimeter defense :

Includes bibliographical references (p. 403-430) and index.

Framing information -- Encryption -- Error correction -- Secret sharing -- Compression -- Basic mimicry -- Grammars and mimicry -- Turing and reverse -- Life in the noise -- Anonymous remailers -- Secret broadcasts -- Keys -- Ordering and reordering -- Spreading -- Synthetic worlds -- Watermarks -- Steganalysis -- Obfuscation -- Synchronization -- Translucent databases -- Plain sight -- Coda.

There are no comments on this title.

to post a comment.