Welcome Guest
  |   0 items in your shopping cart
 

BROWSE BY STANDARDS

BROWSE BY CATEGORY

***
 
 
Join our mailing list to recieve newsletters
 

Investigator's Guide to Steganography

Send to friend
 
Title: Investigator's Guide to Steganography
Author: Gregory Kipper
ISBN: 0849324335 / 9780849324338
Format: Hard Cover
Pages: 240
Publisher: Auerbach
Year: 2004
Availability: 2 to 3 weeks
     
 
  • Description
  • Contents

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Dedication

Chapter 1 : Introduction
Chapter 2 : A Basic Understanding of Steganography
Chapter 3 : Steganography in Depth
Chapter 4 : Watermarking
Chapter 5 : Steganography Tools
Chapter 6 : Nicetext
Chapter 7 : Pretty Good Envelope
Chapter 8 : Products and Companies
Chapter 9 : Real-World Uses
Chapter 10 : Detection and Attacks
Chapter 11 : The Future
Chapter 12 : Glossary

Index

 
 
 
About Us | Contact us
loading...
This page was created in 0.21871709823608 seconds