|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn794683170 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140127s2012 flua ob 000 0 eng d |
010 |
|
|
|a 2011046670
|
040 |
|
|
|a CEF
|b eng
|c CEF
|d OCLCO
|d AU@
|d COO
|d CEF
|d OCLCF
|d WYU
|d YDX
|d TYFRS
|d OCLCQ
|d UKAHL
|d LEAUB
|d ESU
|d VT2
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBB1B6364
|2 bnb
|
016 |
7 |
|
|a 015904075
|2 Uk
|
019 |
|
|
|a 869214382
|a 1028852647
|a 1065859243
|a 1072033256
|a 1086451241
|a 1156391894
|a 1192342242
|a 1240512969
|
020 |
|
|
|z 9781439846216
|
020 |
|
|
|z 1439846219 (hardback)
|
020 |
|
|
|a 9781439846223
|q (e-book : PDF)
|
020 |
|
|
|a 1439846227
|
020 |
|
|
|a 9781138199361
|q (paperback)
|
020 |
|
|
|a 1138199362
|
029 |
1 |
|
|a AU@
|b 000053283062
|
029 |
1 |
|
|a DEBBG
|b BV041778535
|
029 |
1 |
|
|a DEBSZ
|b 404330258
|
029 |
1 |
|
|a GBVCP
|b 882723510
|
029 |
1 |
|
|a AU@
|b 000062628106
|
029 |
1 |
|
|a AU@
|b 000065156182
|
035 |
|
|
|a (OCoLC)794683170
|z (OCoLC)869214382
|z (OCoLC)1028852647
|z (OCoLC)1065859243
|z (OCoLC)1072033256
|z (OCoLC)1086451241
|z (OCoLC)1156391894
|z (OCoLC)1192342242
|z (OCoLC)1240512969
|
037 |
|
|
|a CL0500000366
|b Safari Books Online
|
050 |
|
4 |
|a QA268
|b .D476 2012
|
082 |
0 |
4 |
|a 003/.54
|
084 |
|
|
|a BUS041000
|a COM053000
|a COM083000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Desoky, Abdelrahman.
|
245 |
1 |
0 |
|a Noiseless steganography
|h [electronic resource] :
|b the key to covert communications /
|c Abdelrahman Desoky.
|
260 |
|
|
|a Boca Raton, FL :
|b CRC Press,
|c c2012.
|
300 |
|
|
|a 1 online resource (xix, 276 p.) :
|b ill.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Front Cover -- Dedication -- Contents -- Foreword -- Acknowledgments -- About the Author -- Chapter 1: Introduction -- Chapter 2: Related Work -- Chapter 3: Graphstega: Graph Steganography Methodology -- Chapter 4: Chestega: Chess Steganography Methodology -- Chapter 5: Edustega: Education-Centric Steganography Methodology -- Chapter 6: Sumstega: Summarization-Based Steganography Methodology -- Chapter 7: Matlist: Mature Linguistic Steganography Methodology -- Chapter 8: NORMALS: Normal Linguistic Steganography Methodology -- Chapter 9: Headstega: E-Mail-Headers-Based Steganography Methodology -- Chapter 10: Jokestega: Automatic Joke Generation-Based Steganography Methodology -- Chapter 11: Listega: List-Based Steganography Methodology -- Chapter 12: Notestega: Notes-Based Steganography Methodology -- Chapter 13: Steganalysis Validation -- Chapter 14: Conclusion and Future Work -- Bibliography -- Back Cover.
|
520 |
|
|
|a IntroductionSteganography: Definition, Current State, and ConcernsNoiseless Steganography (Nostega) Paradigm Summary of the ContributionsBook OutlineConclusionRelated WorkText SteganographyNon-Textual SteganographyGraphstega: Graph Steganography MethodologyGraphstega MethodologyOther Steganographic Cover TypesCommunications ProtocolConclusionChestega: Chess Steganography MethodologyChestega MethodologyChestega ImplementationConclusionEdustega: Education-Centric Steganography MethodologyEdustega MethodologyEdustega ImplementationConclusionSumstega: Summarization-Based Steganography MethodologyAutomatic Summarization OverviewSumstega CarriersSumstega MethodologyConclusionMatlist: Mature Linguistic Steganography MethodologyIntroductionMatlist MethodologyMatlist ImplementationConclusionNORMALS: Normal Linguistic Steganography MethodologyNORMALS MethodologyNORMALS ImplementationPerformanceConclusionHeadstega: Steganography MethodologyHeadstega MethodologyHeadstega ImplementationConclusionJokestega: Automatic Joke Generation Based Steganography MethodologyAutomatic Joke Generation Jokestega MethodologyJokestega ImplementationConclusionListega: Steganography MethodologyListega MethodologyListega ImplementationConclusionNotestega: Steganography MethodologyAutomatic Note TakingNotestega MethodologyNotestega ImplementationConclusionSteganalysis ValidationTraffic AttackContrast and Comparison AttacksLinguistics AttacksStatistical SignatureConclusionConclusion and Future WorkContributionsBitrateFinal Conclusion and Future WorkBibliographyIndex.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Confidential communications.
|
650 |
|
0 |
|a Electronics in espionage.
|
650 |
|
0 |
|a Data transmission systems.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Secret professionnel.
|
650 |
|
6 |
|a Électronique dans l'espionnage.
|
650 |
|
7 |
|a Coding theory.
|2 fast
|0 (OCoLC)fst00866237
|
650 |
|
7 |
|a Confidential communications.
|2 fast
|0 (OCoLC)fst00874701
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Data transmission systems.
|2 fast
|0 (OCoLC)fst00887993
|
650 |
|
7 |
|a Electronics in espionage.
|2 fast
|0 (OCoLC)fst00907607
|
710 |
2 |
|
|a ProQuest (Firm)
|
776 |
1 |
|
|z 9781439846216 (hardback)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439846223/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24136585
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24073716
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429063213
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15914785
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n AUP0KE12041PDF
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis27827915
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7265103
|
994 |
|
|
|a 92
|b IZTAP
|