Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
By: and
Sign Up Now!
Already a Member? Log In
You must be logged into UK education collection to access this title.
Learn about membership options,
or view our freely available titles.
- Synopsis
- As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions for data hiding
- Copyright:
- 2013
Book Details
- Book Quality:
- Publisher Quality
- Book Size:
- 350 Pages
- ISBN-13:
- 9781597497411
- Related ISBNs:
- 9781597497435, 9781597497435
- Publisher:
- Elsevier Science
- Date of Addition:
- 04/01/21
- Copyrighted By:
- Elsevier Science & Technology
- Adult content:
- No
- Language:
- English
- Has Image Descriptions:
- No
- Categories:
- Nonfiction, Computers and Internet
- Submitted By:
- Bookshare Staff
- Usage Restrictions:
- This is a copyrighted book.