Asia Pacific University Library catalogue


Data hiding : exposing concealed data in multimedia, operating systems, mobile devices, and network protocols / Michael T. Raggo and Chet Hosmer.

By: Raggo, Michael TContributor(s): Hosmer, ChetMaterial type: TextTextPublication details: Waltham, MA : Syngress, c2013Description: xx, 245 p. : ill. ; 23 cmISBN: 9781597497435 (pbk.)Subject(s): Computer security | Data protectionDDC classification: 005.8 LOC classification: QA76.9.A25 | R34 2013
Contents:
History of data hiding -- Mobile device data hiding -- Windows operating system data hiding -- Linux operating system data hiding -- Storage devices -- Virtual machine hiding -- Steganography -- Forensics/anti-forensics techniques and detecting hidden data -- Hardware data hiding -- Multimedia data hiding and detection -- Parallel processing attacks -- Jamming methods.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 R34 2013 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00030184
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 P76 2002 c.1 The secured enterprise : QA76.9.A25 P76 2002 c.2 The secured enterprise : QA76.9.A25 P76 2008 c.1 Virtual honeypots : QA76.9.A25 R34 2013 c.1 Data hiding : QA76.9.A25 R44 2016 c.1 Effective Python penetration testing : QA76.9 .A25 R47 2018 c.1 Hands-on cybersecurity for architects : plan and design robust security architectures / QA76.9.A25 R53 2008 c.1 Geekonomics :

Includes bibliographical references and index.

History of data hiding -- Mobile device data hiding -- Windows operating system data hiding -- Linux operating system data hiding -- Storage devices -- Virtual machine hiding -- Steganography -- Forensics/anti-forensics techniques and detecting hidden data -- Hardware data hiding -- Multimedia data hiding and detection -- Parallel processing attacks -- Jamming methods.

There are no comments on this title.

to post a comment.