Data hiding techniques in windows OS : (Record no. 6464)

MARC details
000 -LEADER
fixed length control field 01965nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240319174418.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210925b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128044490
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Language of cataloging eng
Description conventions rda
Transcribing agency BUL
Modifying agency BUL
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 005.82
Item number HAS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Hassan, Nihad Ahmad
245 00 - TITLE STATEMENT
Title Data hiding techniques in windows OS :
Remainder of title a practical approach to investigation and defence /
Statement of responsibility, etc. Nihad Ahmad Hassan, Rami Hijazi, Helvi Salminen, technical editor
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Amsterdam :
Name of publisher, distributor, etc. Elsevier,
Date of publication, distribution, etc. c2017
300 ## - PHYSICAL DESCRIPTION
Extent xv, 307 p. :
Other physical details ill. ;
Dimensions 28 cm.
500 ## - GENERAL NOTE
General note CONTENTS<br/><br/>Introduction and historical background<br/>introduction<br/>classical cipher types<br/>modern cryptography systems<br/>steganography<br/>watermarking<br/>e.tc<br/><br/>data hiding using simple methods<br/>introduction<br/>Bit-shifting data hiding<br/>hiding data inside rich text format<br/>documents<br/>e.tc<br/><br/>data hiding using steganographic techniques<br/>introduction<br/>text steganography<br/>data hiding inside audio files<br/>data hiding using other digital media types<br/>e.tc<br/><br/>Data hiding under windows OS file structure<br/>introduction<br/>data hiding using alternate data stream<br/>data hiding using stealth alternate<br/>data stream<br/>e.tc<br/><br/>Data Hiding Using Encryption Techniques<br/>introduction<br/>security awareness corners<br/>anonymous operating system<br/>disk encryption<br/>e.tc<br/><br/>Data Hiding Forensics<br/>Introduction<br/>Understanding Computer forensics<br/>steganalysis<br/>e.tc<br/><br/>Anti forensic Techniques<br/>Introduction<br/>anti forensics goals<br/>data hiding general advice<br/>e.tc<br/><br/>Future Trends<br/>introduction<br/>the future of encryption<br/>data stored in cloud computing<br/>e.tc<br/><br/><br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Windows OS
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data Security
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Hijazi, Rami
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Salminem, Helvi
Relator term technical editor
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 005.82
Item part 1
Call number prefix HAS
Call number suffix 005.82 HAS
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/25/2021 Purchased 0027670   005.82 HAS 1 BUML24030764 09/25/2021 1 09/25/2021 Book Closed Access