000 01965nam a22002777a 4500
003 OSt
005 20240319174418.0
008 210925b ||||| |||| 00| 0 eng d
020 _a9780128044490
040 _aBUL
_beng
_erda
_cBUL
_dBUL
082 _222
_a005.82
_bHAS
100 _aHassan, Nihad Ahmad
245 0 0 _aData hiding techniques in windows OS :
_ba practical approach to investigation and defence /
_cNihad Ahmad Hassan, Rami Hijazi, Helvi Salminen, technical editor
260 _aAmsterdam :
_bElsevier,
_cc2017
300 _axv, 307 p. :
_bill. ;
_c28 cm.
500 _aCONTENTS Introduction and historical background introduction classical cipher types modern cryptography systems steganography watermarking e.tc data hiding using simple methods introduction Bit-shifting data hiding hiding data inside rich text format documents e.tc data hiding using steganographic techniques introduction text steganography data hiding inside audio files data hiding using other digital media types e.tc Data hiding under windows OS file structure introduction data hiding using alternate data stream data hiding using stealth alternate data stream e.tc Data Hiding Using Encryption Techniques introduction security awareness corners anonymous operating system disk encryption e.tc Data Hiding Forensics Introduction Understanding Computer forensics steganalysis e.tc Anti forensic Techniques Introduction anti forensics goals data hiding general advice e.tc Future Trends introduction the future of encryption data stored in cloud computing e.tc
504 _aIncludes index
650 _aWindows OS
650 _aData Security
700 _aHijazi, Rami
700 _aSalminem, Helvi
_etechnical editor
906 _a0
_bibc
_corignew
_d2
_eepcn
_f20
_gy-gencatlg
942 _2ddc
_cBOOK-CA
_h005.82
_i1
_kHAS
_m005.82 HAS
999 _c6464
_d6464