|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn960211534 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
161010s2017 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d OCLCF
|d OCLCQ
|d TOH
|d DEBBG
|d IDEBK
|d DEBSZ
|d OCLCQ
|d UOK
|d CEF
|d KSU
|d OCLCQ
|d INT
|d AU@
|d WYU
|d OCLCQ
|d UAB
|d OCLCQ
|d VLB
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1229760407
|
020 |
|
|
|a 9780128044964
|
020 |
|
|
|a 0128044969
|
020 |
|
|
|a 0128044497
|
020 |
|
|
|a 9780128044490
|
020 |
|
|
|z 9780128044490
|
029 |
1 |
|
|a AU@
|b 000061157104
|
029 |
1 |
|
|a CHNEW
|b 000914245
|
029 |
1 |
|
|a CHVBK
|b 437963985
|
029 |
1 |
|
|a DEBBG
|b BV043969892
|
029 |
1 |
|
|a DEBSZ
|b 485804212
|
029 |
1 |
|
|a GBVCP
|b 882758551
|
035 |
|
|
|a (OCoLC)960211534
|z (OCoLC)1229760407
|
037 |
|
|
|a CL0500000791
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.82
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hassan, Nihad Ahmad,
|e author.
|
245 |
1 |
0 |
|a Data hiding techniques in Windows OS :
|b a practical approach to investigation and defense /
|c Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor.
|
264 |
|
1 |
|a Cambridge, MA :
|b Syngress,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (viewed October 10, 2016).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g 1.
|t Introduction and Historical Background --
|t Introduction --
|t Classical Cipher Types --
|t Substitution Cipher --
|t Transposition Cipher --
|t Other Ciphers and Codes --
|t Difference Between Substitution and Transposition Cipher --
|t Practicing Old Ciphers Using Modem Computing --
|t Modern Cryptography Systems --
|t Secret Key Cryptography --
|t Public Key Cryptography --
|t Digital Signature --
|t Cryptographic Hash Function --
|t Steganography --
|t What Is Steganography? --
|t Comparing Steganography and Cryptography --
|t Steganography Types --
|t Watermarking --
|t Watermarking Types --
|t Compare Steganography and Watermarking --
|t Anonymity --
|t Summary --
|t References --
|t Bibliography --
|g 2.
|t Data Hiding Using Simple Methods --
|t Introduction --
|t Bit-Shifting Data Hiding --
|t Hiding Data Inside Rich Text Format Documents --
|t Renaming Files --
|t Matching File Signatures and File Extensions --
|t Hiding Data in Compressed Files --
|t Hiding Data Through File Splitting --
|t Hiding Data in Microsoft® Office Documents --
|t Hidden Text --
|t Hidden Data Within Document Attributes (Metadata) --
|t White Font --
|t Hiding Data by Exploiting OLE Structured Storage --
|t Self-Encrypt MS Office® Document --
|t Hiding Inside MS Excel® Spreadsheet --
|t Data Hiding Inside Image Attributes (Image Metadata) --
|t Summary --
|t References --
|t Bibliography --
|g 3.
|t Data Hiding Using Steganographic Techniques --
|t Introduction --
|t Text Steganography --
|t Format-Based Steganography --
|t Random and Statistical Generation --
|t Linguistic-Based Methods --
|t Hiding Inside MS Office® Documents Based on OOXML File Format --
|t Webpage Text Steganography --
|t Hiding Secret Messages Inside Twitter Updates --
|t Image Steganography --
|t Digital Image Basic Concepts --
|t Image Steganographic Techniques --
|t Digital Media Steganography Tools --
|t Data Hiding Inside Audio Files --
|t Audio Files Basic Concepts --
|t Audio Steganography Types --
|t Data Hiding Using Other Digital Media Types --
|t Data Hiding Inside PDF Documents --
|t Data Hiding Inside Program Binaries --
|t Summary --
|t References --
|t Bibliography --
|g 4.
|t Data Hiding Under Windows® OS File Structure --
|t Introduction --
|t Data Hiding Using Alternate Data Stream --
|t What Is the New Technology File System? --
|t What Is an Alternate Data Stream? --
|t How Can We Use Alternate Data Streams to Hide Files? --
|t Hiding Executable Code in Alternate Data Stream Files --
|t Important Notes About Using Alternate Data Stream in Hiding Files --
|t How to Delete Alternate Data Stream Files --
|t Detecting Alternate Data Stream Files --
|t Data Hiding Using Stealth Alternate Data Stream --
|t Hiding Data Inside Windows® Restoration Points --
|t Hiding Data Inside Windows® Registry --
|t Hiding in a File's Slack Space --
|t Understanding Hard Disk Drives --
|t File Allocation Table --
|t Hidden Partitions --
|t Hidden Partitions Under Windows® OS --
|t Creating a Hidden Partition Within a USB Zip Drive --
|t Data Hiding Within Master File Table --
|t Data Hiding in Disk Bad Blocks --
|t Data Hiding Under Computer Hardware Level --
|t Data Hiding Inside Host Protected Area --
|t Hiding Data in Device Configuration Overlay --
|t Summary --
|t References --
|t Bibliography --
|g 5.
|t Data Hiding Using Encryption Techniques --
|t Introduction --
|t Security Awareness Corners --
|t Human Security --
|t Device Security --
|t Message Security --
|t Network Security --
|t Anonymous Operating System --
|t Tails --
|t Ubuntu Privacy Remix --
|t Other Security Distributions --
|t Advice When Using Security Operating Systems --
|t Portable Stick Computer --
|t Disk Encryption --
|t Encrypting Partitions Using BitLocker --
|t Creating Encrypted Vaults --
|t Single File Encryption --
|t Cloud Storage Encryption --
|t Discussion of Security Level in Disk Encryption --
|t Anonymize Your Location Online --
|t Using the TOR Browser --
|t Virtual Private Networks --
|t SSH Tunneling --
|t Using Proxy Server --
|t Anonymous Search Engine --
|t Web Browser Privacy Add-Ons --
|t Secure Anonymous File Sharing --
|t Encrypting Email Communications --
|t Email Encryption Using Gpg4Win --
|t Open PGP Encryption for Webmail Using the Mailvelope Browser Extension --
|t Secure Web Mail Providers --
|t Encrypt Instant Messaging, Video Calls, and VOIP Sessions --
|t What Are the Risks? --
|t Off-the-Record-Messaging and Pidgin --
|t Secure Video Calling Service Using Gruveo --
|t Secure Anonymous Calling Service Using GHOST CALL --
|t Retroshare Secure Social Platform --
|t TOR Messenger --
|t Complete Anonymous IM Using Ricochet --
|t Create and Maintain Secure Passwords --
|t Password Best Practice --
|t Password Generation Tools --
|t Password-Saving Techniques --
|t Password Manager Tools --
|t Miscellaneous Security Hints and Best Practices --
|t Summary --
|t References --
|t Bibliography --
|g 6.
|t Data Hiding Forensics --
|t Introduction --
|t Understanding Computer Forensics --
|t Computer Forensic Process --
|t Differences Between Computer Forensics and Other Computing Domains --
|t Need for Digital Evidence --
|t Steganalysis --
|t Steganalysis Methods --
|t Destroying Hidden Data --
|t Steganalysis of Digital Media Files --
|t Text Document Steganalysis --
|t Image Forensics --
|t Audio Forensics --
|t Video Forensics --
|t Digital Files Metadata Forensic --
|t Windows Forensics --
|t Capture Volatile Memory --
|t Capture Disk Drive --
|t Deleted Files Recovery --
|t Windows Registry Analysis --
|t Forensic Analysis of Windows Prefetch Files --
|t Windows Minidump Files Forensics --
|t Windows Thumbnail Forensics --
|t File Signature Analysis --
|t File Attributes Analysis --
|t Discover Hidden Partitions --
|t Detect Alternative Data Streams --
|t Investigating Windows Volume Shadow Copy --
|t Virtual Memory Analysis --
|t Windows Password Cracking --
|t Host Protected Area and Device Configuration Relay Forensic --
|t Examining Encrypted Files --
|t Summary --
|t References --
|t Bibliography --
|g 7.
|t Antiforensic Techniques --
|t Introduction --
|t Antiforensics Goals --
|t Data Hiding General Advice --
|t Data Destruction --
|t Hard Disk Wiping --
|t Manipulating Digital File Metadata --
|t Windows Antiforensics Techniques --
|t Configure Windows for Better Privacy --
|t Disable Recycle Bin --
|t Registry Antiforensics --
|t Disable Windows Hibernation --
|t Disable Windows Virtual Memory (Paging File) --
|t Disable System Restore Points and File History --
|t Disable Windows Thumbnail Cache --
|t Disable Windows Prefetch Feature --
|t Disable Windows Logging --
|t Disable Windows® Password Hash Extraction --
|t Clearing Digital Footprints --
|t Live CDs and Bootable USB Tokens --
|t Virtual Machines --
|t Using Portable Applications --
|t Direct Attack Against Forensic Software --
|t Summary --
|t References --
|t Bibliography --
|g 8.
|t Future Trends --
|t Introduction --
|t Future of Encryption --
|t Data Stored in Cloud Computing --
|t Visualization Technology --
|t Data Hiding in Enterprise Networks --
|t Data Concealment --
|t Data Leakage Prevention --
|t Streaming Protocols --
|t Wireless Networks and Future Networking Protocols --
|t Data Hiding in Mobile Devices --
|t Anonymous Networks --
|t Summary --
|t References --
|t Bibliography.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
700 |
1 |
|
|a Hijazi, Rami,
|e author.
|
700 |
1 |
|
|a Salminen, Helvi,
|e editor.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128044964/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis35836840
|
994 |
|
|
|a 92
|b IZTAP
|