Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Data hiding techniques in Windows OS...
~
Hassan, Nihad Ahmad,
Data hiding techniques in Windows OSa practical approach to investigation and defense /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Data hiding techniques in Windows OSNihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor.
Reminder of title:
a practical approach to investigation and defense /
Author:
Hassan, Nihad Ahmad,
other author:
Hijazi, Rami,
Published:
Cambridge, MA :Syngress,2017.
Description:
1 online resource :ill.
Subject:
Data encryption (Computer science)
Online resource:
https://www.sciencedirect.com/science/book/9780128044490
ISBN:
9780128044964 (electronic bk.)
Data hiding techniques in Windows OSa practical approach to investigation and defense /
Hassan, Nihad Ahmad,
Data hiding techniques in Windows OS
a practical approach to investigation and defense /[electronic resource] :Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor. - Cambridge, MA :Syngress,2017. - 1 online resource :ill.
Includes bibliographical references and index.
Introduction and Historical Background --Machine generated contents note:
ISBN: 9780128044964 (electronic bk.)Subjects--Topical Terms:
184520
Data encryption (Computer science)
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Data hiding techniques in Windows OSa practical approach to investigation and defense /
LDR
:08049cmm a2200265 a 4500
001
601458
006
m o d
007
cr unu||||||||
008
211110s2017 maua gob 001 0 eng d
020
$a
9780128044964 (electronic bk.)
020
$a
0128044969 (electronic bk.)
020
$a
9780128044490
020
$a
0128044497
035
$a
(OCoLC)1047829629
035
$a
ocn960211534
040
$a
UMI
$b
eng
$c
UMI
$d
STF
$d
OCLCF
$d
OCLCQ
$d
TOH
$d
DEBBG
$d
IDEBK
$d
DEBSZ
$d
OCLCQ
$d
UOK
$d
CEF
$d
KSU
$d
OCLCQ
$d
INT
$d
AU@
$d
WYU
$d
OCLCQ
$d
UAB
$d
OCLCQ
$d
VLB
$d
LVT
041
0
$a
eng
050
4
$a
QA76.9.A25
082
0 4
$a
005.82
$2
23
100
1
$a
Hassan, Nihad Ahmad,
$e
author.
$3
896541
245
1 0
$a
Data hiding techniques in Windows OS
$h
[electronic resource] :
$b
a practical approach to investigation and defense /
$c
Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor.
260
$a
Cambridge, MA :
$b
Syngress,
$c
2017.
300
$a
1 online resource :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0 0
$g
Machine generated contents note:
$g
1.
$t
Introduction and Historical Background --
$t
Introduction --
$t
Classical Cipher Types --
$t
Substitution Cipher --
$t
Transposition Cipher --
$t
Other Ciphers and Codes --
$t
Difference Between Substitution and Transposition Cipher --
$t
Practicing Old Ciphers Using Modem Computing --
$t
Modern Cryptography Systems --
$t
Secret Key Cryptography --
$t
Public Key Cryptography --
$t
Digital Signature --
$t
Cryptographic Hash Function --
$t
Steganography --
$t
What Is Steganography? --
$t
Comparing Steganography and Cryptography --
$t
Steganography Types --
$t
Watermarking --
$t
Watermarking Types --
$t
Compare Steganography and Watermarking --
$t
Anonymity --
$t
Summary --
$t
References --
$t
Bibliography --
$g
2.
$t
Data Hiding Using Simple Methods --
$t
Introduction --
$t
Bit-Shifting Data Hiding --
$t
Hiding Data Inside Rich Text Format Documents --
$t
Renaming Files --
$t
Matching File Signatures and File Extensions --
$t
Hiding Data in Compressed Files --
$t
Hiding Data Through File Splitting --
$t
Hiding Data in Microsoft® Office Documents --
$t
Hidden Text --
$t
Hidden Data Within Document Attributes (Metadata) --
$t
White Font --
$t
Hiding Data by Exploiting OLE Structured Storage --
$t
Self-Encrypt MS Office® Document --
$t
Hiding Inside MS Excel® Spreadsheet --
$t
Data Hiding Inside Image Attributes (Image Metadata) --
$t
Summary --
$t
References --
$t
Bibliography --
$g
3.
$t
Data Hiding Using Steganographic Techniques --
$t
Introduction --
$t
Text Steganography --
$t
Format-Based Steganography --
$t
Random and Statistical Generation --
$t
Linguistic-Based Methods --
$t
Hiding Inside MS Office® Documents Based on OOXML File Format --
$t
Webpage Text Steganography --
$t
Hiding Secret Messages Inside Twitter Updates --
$t
Image Steganography --
$t
Digital Image Basic Concepts --
$t
Image Steganographic Techniques --
$t
Digital Media Steganography Tools --
$t
Data Hiding Inside Audio Files --
$t
Audio Files Basic Concepts --
$t
Audio Steganography Types --
$t
Data Hiding Using Other Digital Media Types --
$t
Data Hiding Inside PDF Documents --
$t
Data Hiding Inside Program Binaries --
$t
Summary --
$t
References --
$t
Bibliography --
$g
4.
$t
Data Hiding Under Windows® OS File Structure --
$t
Introduction --
$t
Data Hiding Using Alternate Data Stream --
$t
What Is the New Technology File System? --
$t
What Is an Alternate Data Stream? --
$t
How Can We Use Alternate Data Streams to Hide Files? --
$t
Hiding Executable Code in Alternate Data Stream Files --
$t
Important Notes About Using Alternate Data Stream in Hiding Files --
$t
How to Delete Alternate Data Stream Files --
$t
Detecting Alternate Data Stream Files --
$t
Data Hiding Using Stealth Alternate Data Stream --
$t
Hiding Data Inside Windows® Restoration Points --
$t
Hiding Data Inside Windows® Registry --
$t
Hiding in a File's Slack Space --
$t
Understanding Hard Disk Drives --
$t
File Allocation Table --
$t
Hidden Partitions --
$t
Hidden Partitions Under Windows® OS --
$t
Creating a Hidden Partition Within a USB Zip Drive --
$t
Data Hiding Within Master File Table --
$t
Data Hiding in Disk Bad Blocks --
$t
Data Hiding Under Computer Hardware Level --
$t
Data Hiding Inside Host Protected Area --
$t
Hiding Data in Device Configuration Overlay --
$t
Summary --
$t
References --
$t
Bibliography --
$g
5.
$t
Data Hiding Using Encryption Techniques --
$t
Introduction --
$t
Security Awareness Corners --
$t
Human Security --
$t
Device Security --
$t
Message Security --
$t
Network Security --
$t
Anonymous Operating System --
$t
Tails --
$t
Ubuntu Privacy Remix --
$t
Other Security Distributions --
$t
Advice When Using Security Operating Systems --
$t
Portable Stick Computer --
$t
Disk Encryption --
$t
Encrypting Partitions Using BitLocker --
$t
Creating Encrypted Vaults --
$t
Single File Encryption --
$t
Cloud Storage Encryption --
$t
Discussion of Security Level in Disk Encryption --
$t
Anonymize Your Location Online --
$t
Using the TOR Browser --
$t
Virtual Private Networks --
$t
SSH Tunneling --
$t
Using Proxy Server --
$t
Anonymous Search Engine --
$t
Web Browser Privacy Add-Ons --
$t
Secure Anonymous File Sharing --
$t
Encrypting Email Communications --
$t
Email Encryption Using Gpg4Win --
$t
Open PGP Encryption for Webmail Using the Mailvelope Browser Extension --
$t
Secure Web Mail Providers --
$t
Encrypt Instant Messaging, Video Calls, and VOIP Sessions --
$t
What Are the Risks? --
$t
Off-the-Record-Messaging and Pidgin --
$t
Secure Video Calling Service Using Gruveo --
$t
Secure Anonymous Calling Service Using GHOST CALL --
$t
Retroshare Secure Social Platform --
$t
TOR Messenger --
$t
Complete Anonymous IM Using Ricochet --
$t
Create and Maintain Secure Passwords --
$t
Password Best Practice --
$t
Password Generation Tools --
$t
Password-Saving Techniques --
$t
Password Manager Tools --
$t
Miscellaneous Security Hints and Best Practices --
$t
Summary --
$t
References --
$t
Bibliography --
$g
6.
$t
Data Hiding Forensics --
$t
Introduction --
$t
Understanding Computer Forensics --
$t
Computer Forensic Process --
$t
Differences Between Computer Forensics and Other Computing Domains --
$t
Need for Digital Evidence --
$t
Steganalysis --
$t
Steganalysis Methods --
$t
Destroying Hidden Data --
$t
Steganalysis of Digital Media Files --
$t
Text Document Steganalysis --
$t
Image Forensics --
$t
Audio Forensics --
$t
Video Forensics --
$t
Digital Files Metadata Forensic --
$t
Windows Forensics --
$t
Capture Volatile Memory --
$t
Capture Disk Drive --
$t
Deleted Files Recovery --
$t
Windows Registry Analysis --
$t
Forensic Analysis of Windows Prefetch Files --
$t
Windows Minidump Files Forensics --
$t
Windows Thumbnail Forensics --
$t
File Signature Analysis --
$t
File Attributes Analysis --
$t
Discover Hidden Partitions --
$t
Detect Alternative Data Streams --
$t
Investigating Windows Volume Shadow Copy --
$t
Virtual Memory Analysis --
$t
Windows Password Cracking --
$t
Host Protected Area and Device Configuration Relay Forensic --
$t
Examining Encrypted Files --
$t
Summary --
$t
References --
$t
Bibliography --
$g
7.
$t
Antiforensic Techniques --
$t
Introduction --
$t
Antiforensics Goals --
$t
Data Hiding General Advice --
$t
Data Destruction --
$t
Hard Disk Wiping --
$t
Manipulating Digital File Metadata --
$t
Windows Antiforensics Techniques --
$t
Configure Windows for Better Privacy --
$t
Disable Recycle Bin --
$t
Registry Antiforensics --
$t
Disable Windows Hibernation --
$t
Disable Windows Virtual Memory (Paging File) --
$t
Disable System Restore Points and File History --
$t
Disable Windows Thumbnail Cache --
$t
Disable Windows Prefetch Feature --
$t
Disable Windows Logging --
$t
Disable Windows® Password Hash Extraction --
$t
Clearing Digital Footprints --
$t
Live CDs and Bootable USB Tokens --
$t
Virtual Machines --
$t
Using Portable Applications --
$t
Direct Attack Against Forensic Software --
$t
Summary --
$t
References --
$t
Bibliography --
$g
8.
$t
Future Trends --
$t
Introduction --
$t
Future of Encryption --
$t
Data Stored in Cloud Computing --
$t
Visualization Technology --
$t
Data Hiding in Enterprise Networks --
$t
Data Concealment --
$t
Data Leakage Prevention --
$t
Streaming Protocols --
$t
Wireless Networks and Future Networking Protocols --
$t
Data Hiding in Mobile Devices --
$t
Anonymous Networks --
$t
Summary --
$t
References --
$t
Bibliography.
588
0
$a
Online resource; title from title page (viewed October 10, 2016).
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Data protection.
$3
202312
650
7
$a
COMPUTERS
$x
Computer Science.
$2
bisacsh
$3
538068
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Hijazi, Rami,
$e
author.
$3
896542
700
1
$a
Salminen, Helvi,
$e
editor.
$3
896543
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128044490
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000200714
電子館藏
1圖書
電子書
EB QA76.9.A25 2017
一般使用(Normal)
in cat dept.
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9780128044490
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login