000 | 01965nam a22002777a 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20240319174418.0 | ||
008 | 210925b ||||| |||| 00| 0 eng d | ||
020 | _a9780128044490 | ||
040 |
_aBUL _beng _erda _cBUL _dBUL |
||
082 |
_222 _a005.82 _bHAS |
||
100 | _aHassan, Nihad Ahmad | ||
245 | 0 | 0 |
_aData hiding techniques in windows OS : _ba practical approach to investigation and defence / _cNihad Ahmad Hassan, Rami Hijazi, Helvi Salminen, technical editor |
260 |
_aAmsterdam : _bElsevier, _cc2017 |
||
300 |
_axv, 307 p. : _bill. ; _c28 cm. |
||
500 | _aCONTENTS Introduction and historical background introduction classical cipher types modern cryptography systems steganography watermarking e.tc data hiding using simple methods introduction Bit-shifting data hiding hiding data inside rich text format documents e.tc data hiding using steganographic techniques introduction text steganography data hiding inside audio files data hiding using other digital media types e.tc Data hiding under windows OS file structure introduction data hiding using alternate data stream data hiding using stealth alternate data stream e.tc Data Hiding Using Encryption Techniques introduction security awareness corners anonymous operating system disk encryption e.tc Data Hiding Forensics Introduction Understanding Computer forensics steganalysis e.tc Anti forensic Techniques Introduction anti forensics goals data hiding general advice e.tc Future Trends introduction the future of encryption data stored in cloud computing e.tc | ||
504 | _aIncludes index | ||
650 | _aWindows OS | ||
650 | _aData Security | ||
700 | _aHijazi, Rami | ||
700 |
_aSalminem, Helvi _etechnical editor |
||
906 |
_a0 _bibc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBOOK-CA _h005.82 _i1 _kHAS _m005.82 HAS |
||
999 |
_c6464 _d6464 |