Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigator's Guide to Steganography

Buy

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

About the Author

Greg Kipper, CISSP, works as an IT security consultant and computer forensics investigator in the Washington, D.C. area.

(HTML tags aren't allowed.)

Extreme Programming Explained : Embrace Change (2nd Edition)
Extreme Programming Explained : Embrace Change (2nd Edition)

Whether you have a small team that is already closely aligned with your customers or a large team in a gigantic or multinational organization, you will find in these pages a wealth of ideas to challenge, inspire, and encourage you and your team members to substantially improve your software development.

...
User-Centered Information Design for Improved Software Usability (Artech House Computer Science Library)
User-Centered Information Design for Improved Software Usability (Artech House Computer Science Library)
Describes a unique user-centered design method that helps the software project team decide what information to provide and in what media, based on user's information needs and project requirements. DLC: User interfaces (Computer systems).

About the Author

Pradeep Henry has more than 10 years
...
Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)
Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)

12 The average human body has in the order of 10 circulating platelets. They are crucial for hemostasis, and yet excessive platelet activation is a major cause of m- bidity and mortality in western societies. It is therefore not surprising that platelets have become one of the most extensively investigated biological cell types. We are,...


The ActionScript 3.0 Quick Reference Guide: For Developers and Designers Using Flash: For Developers and Designers Using Flash CS4 Professional (Adobe Developer Library)
The ActionScript 3.0 Quick Reference Guide: For Developers and Designers Using Flash: For Developers and Designers Using Flash CS4 Professional (Adobe Developer Library)

"No matter what your background, the pages that follow will provide you with some excellent knowledge, insight, and even a little bit of wisdom in the realm of Flash and ActionScript. Happy learning!"-- Branden Hall, from the Foreword

Written by Flash insiders with extensive knowledge of the technology,
...

Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Programming the Cell Broadband Engine Architecture: Examples and Best Practices
Programming the Cell Broadband Engine Architecture: Examples and Best Practices

In this IBM® Redbooks® publication, we provide an introduction to the Cell Broadband Engine™ (Cell/B.E.™ ) platform. We show detailed samples from real-world application development projects and provide tips and best practices for programming Cell/B.E. applications.

We also describe...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy