Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New)

,

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. "Data Hiding "provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions fordata hiding"


R1,145
List Price R1,222
Save R77 6%

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles11450
Mobicred@R107pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 12 - 17 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. "Data Hiding "provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions fordata hiding"

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Syngress Media,U.S.

Country of origin

United States

Release date

December 2012

Availability

Expected to ship within 12 - 17 working days

First published

November 2012

Authors

,

Dimensions

235 x 191 x 14mm (L x W x T)

Format

Paperback

Pages

350

Edition

New

ISBN-13

978-1-59749-743-5

Barcode

9781597497435

Categories

LSN

1-59749-743-6



Trending On Loot