Cargando…

Data hiding techniques in Windows OS : a practical approach to investigation and defense /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hassan, Nihad Ahmad (Autor), Hijazi, Rami (Autor)
Otros Autores: Salminen, Helvi (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn960211534
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 161010s2017 maua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d OCLCF  |d OCLCQ  |d TOH  |d DEBBG  |d IDEBK  |d DEBSZ  |d OCLCQ  |d UOK  |d CEF  |d KSU  |d OCLCQ  |d INT  |d AU@  |d WYU  |d OCLCQ  |d UAB  |d OCLCQ  |d VLB  |d LVT  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1229760407 
020 |a 9780128044964 
020 |a 0128044969 
020 |a 0128044497 
020 |a 9780128044490 
020 |z 9780128044490 
029 1 |a AU@  |b 000061157104 
029 1 |a CHNEW  |b 000914245 
029 1 |a CHVBK  |b 437963985 
029 1 |a DEBBG  |b BV043969892 
029 1 |a DEBSZ  |b 485804212 
029 1 |a GBVCP  |b 882758551 
035 |a (OCoLC)960211534  |z (OCoLC)1229760407 
037 |a CL0500000791  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.82  |2 23 
049 |a UAMI 
100 1 |a Hassan, Nihad Ahmad,  |e author. 
245 1 0 |a Data hiding techniques in Windows OS :  |b a practical approach to investigation and defense /  |c Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor. 
264 1 |a Cambridge, MA :  |b Syngress,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (viewed October 10, 2016). 
504 |a Includes bibliographical references and index. 
505 0 0 |g Machine generated contents note:  |g 1.  |t Introduction and Historical Background --  |t Introduction --  |t Classical Cipher Types --  |t Substitution Cipher --  |t Transposition Cipher --  |t Other Ciphers and Codes --  |t Difference Between Substitution and Transposition Cipher --  |t Practicing Old Ciphers Using Modem Computing --  |t Modern Cryptography Systems --  |t Secret Key Cryptography --  |t Public Key Cryptography --  |t Digital Signature --  |t Cryptographic Hash Function --  |t Steganography --  |t What Is Steganography? --  |t Comparing Steganography and Cryptography --  |t Steganography Types --  |t Watermarking --  |t Watermarking Types --  |t Compare Steganography and Watermarking --  |t Anonymity --  |t Summary --  |t References --  |t Bibliography --  |g 2.  |t Data Hiding Using Simple Methods --  |t Introduction --  |t Bit-Shifting Data Hiding --  |t Hiding Data Inside Rich Text Format Documents --  |t Renaming Files --  |t Matching File Signatures and File Extensions --  |t Hiding Data in Compressed Files --  |t Hiding Data Through File Splitting --  |t Hiding Data in Microsoft® Office Documents --  |t Hidden Text --  |t Hidden Data Within Document Attributes (Metadata) --  |t White Font --  |t Hiding Data by Exploiting OLE Structured Storage --  |t Self-Encrypt MS Office® Document --  |t Hiding Inside MS Excel® Spreadsheet --  |t Data Hiding Inside Image Attributes (Image Metadata) --  |t Summary --  |t References --  |t Bibliography --  |g 3.  |t Data Hiding Using Steganographic Techniques --  |t Introduction --  |t Text Steganography --  |t Format-Based Steganography --  |t Random and Statistical Generation --  |t Linguistic-Based Methods --  |t Hiding Inside MS Office® Documents Based on OOXML File Format --  |t Webpage Text Steganography --  |t Hiding Secret Messages Inside Twitter Updates --  |t Image Steganography --  |t Digital Image Basic Concepts --  |t Image Steganographic Techniques --  |t Digital Media Steganography Tools --  |t Data Hiding Inside Audio Files --  |t Audio Files Basic Concepts --  |t Audio Steganography Types --  |t Data Hiding Using Other Digital Media Types --  |t Data Hiding Inside PDF Documents --  |t Data Hiding Inside Program Binaries --  |t Summary --  |t References --  |t Bibliography --  |g 4.  |t Data Hiding Under Windows® OS File Structure --  |t Introduction --  |t Data Hiding Using Alternate Data Stream --  |t What Is the New Technology File System? --  |t What Is an Alternate Data Stream? --  |t How Can We Use Alternate Data Streams to Hide Files? --  |t Hiding Executable Code in Alternate Data Stream Files --  |t Important Notes About Using Alternate Data Stream in Hiding Files --  |t How to Delete Alternate Data Stream Files --  |t Detecting Alternate Data Stream Files --  |t Data Hiding Using Stealth Alternate Data Stream --  |t Hiding Data Inside Windows® Restoration Points --  |t Hiding Data Inside Windows® Registry --  |t Hiding in a File's Slack Space --  |t Understanding Hard Disk Drives --  |t File Allocation Table --  |t Hidden Partitions --  |t Hidden Partitions Under Windows® OS --  |t Creating a Hidden Partition Within a USB Zip Drive --  |t Data Hiding Within Master File Table --  |t Data Hiding in Disk Bad Blocks --  |t Data Hiding Under Computer Hardware Level --  |t Data Hiding Inside Host Protected Area --  |t Hiding Data in Device Configuration Overlay --  |t Summary --  |t References --  |t Bibliography --  |g 5.  |t Data Hiding Using Encryption Techniques --  |t Introduction --  |t Security Awareness Corners --  |t Human Security --  |t Device Security --  |t Message Security --  |t Network Security --  |t Anonymous Operating System --  |t Tails --  |t Ubuntu Privacy Remix --  |t Other Security Distributions --  |t Advice When Using Security Operating Systems --  |t Portable Stick Computer --  |t Disk Encryption --  |t Encrypting Partitions Using BitLocker --  |t Creating Encrypted Vaults --  |t Single File Encryption --  |t Cloud Storage Encryption --  |t Discussion of Security Level in Disk Encryption --  |t Anonymize Your Location Online --  |t Using the TOR Browser --  |t Virtual Private Networks --  |t SSH Tunneling --  |t Using Proxy Server --  |t Anonymous Search Engine --  |t Web Browser Privacy Add-Ons --  |t Secure Anonymous File Sharing --  |t Encrypting Email Communications --  |t Email Encryption Using Gpg4Win --  |t Open PGP Encryption for Webmail Using the Mailvelope Browser Extension --  |t Secure Web Mail Providers --  |t Encrypt Instant Messaging, Video Calls, and VOIP Sessions --  |t What Are the Risks? --  |t Off-the-Record-Messaging and Pidgin --  |t Secure Video Calling Service Using Gruveo --  |t Secure Anonymous Calling Service Using GHOST CALL --  |t Retroshare Secure Social Platform --  |t TOR Messenger --  |t Complete Anonymous IM Using Ricochet --  |t Create and Maintain Secure Passwords --  |t Password Best Practice --  |t Password Generation Tools --  |t Password-Saving Techniques --  |t Password Manager Tools --  |t Miscellaneous Security Hints and Best Practices --  |t Summary --  |t References --  |t Bibliography --  |g 6.  |t Data Hiding Forensics --  |t Introduction --  |t Understanding Computer Forensics --  |t Computer Forensic Process --  |t Differences Between Computer Forensics and Other Computing Domains --  |t Need for Digital Evidence --  |t Steganalysis --  |t Steganalysis Methods --  |t Destroying Hidden Data --  |t Steganalysis of Digital Media Files --  |t Text Document Steganalysis --  |t Image Forensics --  |t Audio Forensics --  |t Video Forensics --  |t Digital Files Metadata Forensic --  |t Windows Forensics --  |t Capture Volatile Memory --  |t Capture Disk Drive --  |t Deleted Files Recovery --  |t Windows Registry Analysis --  |t Forensic Analysis of Windows Prefetch Files --  |t Windows Minidump Files Forensics --  |t Windows Thumbnail Forensics --  |t File Signature Analysis --  |t File Attributes Analysis --  |t Discover Hidden Partitions --  |t Detect Alternative Data Streams --  |t Investigating Windows Volume Shadow Copy --  |t Virtual Memory Analysis --  |t Windows Password Cracking --  |t Host Protected Area and Device Configuration Relay Forensic --  |t Examining Encrypted Files --  |t Summary --  |t References --  |t Bibliography --  |g 7.  |t Antiforensic Techniques --  |t Introduction --  |t Antiforensics Goals --  |t Data Hiding General Advice --  |t Data Destruction --  |t Hard Disk Wiping --  |t Manipulating Digital File Metadata --  |t Windows Antiforensics Techniques --  |t Configure Windows for Better Privacy --  |t Disable Recycle Bin --  |t Registry Antiforensics --  |t Disable Windows Hibernation --  |t Disable Windows Virtual Memory (Paging File) --  |t Disable System Restore Points and File History --  |t Disable Windows Thumbnail Cache --  |t Disable Windows Prefetch Feature --  |t Disable Windows Logging --  |t Disable Windows® Password Hash Extraction --  |t Clearing Digital Footprints --  |t Live CDs and Bootable USB Tokens --  |t Virtual Machines --  |t Using Portable Applications --  |t Direct Attack Against Forensic Software --  |t Summary --  |t References --  |t Bibliography --  |g 8.  |t Future Trends --  |t Introduction --  |t Future of Encryption --  |t Data Stored in Cloud Computing --  |t Visualization Technology --  |t Data Hiding in Enterprise Networks --  |t Data Concealment --  |t Data Leakage Prevention --  |t Streaming Protocols --  |t Wireless Networks and Future Networking Protocols --  |t Data Hiding in Mobile Devices --  |t Anonymous Networks --  |t Summary --  |t References --  |t Bibliography. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Data encryption (Computer science) 
650 0 |a Data protection. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Data protection  |2 fast 
700 1 |a Hijazi, Rami,  |e author. 
700 1 |a Salminen, Helvi,  |e editor. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128044964/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis35836840 
994 |a 92  |b IZTAP