Data Hiding Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

ISBN-10: 1597497436

ISBN-13: 9781597497435

Edition: 2012

Buy it from $53.71
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

"Data Hiding" is otherwise known as "anti-forensics" which is: a general term for a set of techniques used as countermeasures to forensic analysis. Sophisticated data hiding techniques continue to evade detection by intrusion detection systems, DLP solutions, and forensic analysts. Detection of steganography techniques used to hide messages with pictures and other files usually go undetected in even the large enterprise networks. Derivative approaches of multi-layer hiding techniques haven't even been addresses in the information security marketplace. Yet issues with espionage, data leakage (just look at wikileaks), and covert communications continue to challenge everyone. This book outlines many of the latest data hiding techniques in a fun and creative format, so as to raise the awareness of these threats to networks and corporations. And hopefully further promote research for detecting these threats.Broaden your knowledge about threats to your data or networksUnderstand sophisticated data hiding techniques, secret/covert communications, and espionageLearn how data is hidden amongst a wide variety of devices: computers, iPad, smart phones, and more
New Starting from $58.60
eBooks Starting from $49.95
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

Copyright year: 2012
Publisher: Elsevier Science & Technology Books
Publication date: 11/9/2012
Binding: Paperback
Pages: 350
Size: 7.50" wide x 9.25" long x 0.50" tall
Weight: 1.342
Language: English

Michael Raggo (CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI) applies over 20 years of security technology experience and evangelism to the technical delivery of Security Solutions. Mr. Raggo's technology experience includes penetration testing, wireless security assessments, compliance assessments, firewall and IDS/IPS deployments, mobile device security, incident response and forensics, and security research, and is a former security trainer. In addition, Mr. Raggo conducts ongoing independent research on various Data Hiding techniques including steganography. Mr. Raggo has presented on various security topics at numerous conferences around the world (BlackHat, DefCon, SANS, DoD Cyber crime, OWASP, InfoSec, etc.) and has briefed the Pentagon on Steganograpy and Steganalysis techniques.

Dedication
Raggo Acknowledgments
Hosmer Acknowledgments
About the Authors
About the Techical Editor
Preface
History of Secret Writing
Introduction
Cryptology
Substitution Cipher
Transposition Cipher
The Difference Between Substitution Ciphers and Transposition Ciphers
Steganography
Cardano's Grille
Summary
References
Four Easy Data Hiding Exercises
Hiding Data in Microsoft Word
Image Metadata
Mobile Device Data Hiding
File Compression Tool Data Hiding
Summary
References
Steganography
Introduction
Steganographic Techniques
Insertion Methods
Modification
Hiding in PDFs (Insertion Meets LSB)
Hiding in Executables (Hydan)
Hiding in HTML
Steganalysis
Anomalous Analysis
Steganalysis Tools
Freeware Tools
Summary
References
Multimedia Data Hiding
Multimedia Overview
Data Hiding in Digital Audio
Simple Audio File Embedding (Imperceptible Approach)
Data hiding in a .wav file
StegAnalysis of LSB Wave Data Hiding
Advanced Audio File Embedding
Audio Summary
Data Hiding in Digital Video
MSU Stego
TCStego
Summary
References
Data Hiding Among Android Mobile Devices
Android Overview
Android ImgHid and Reveal App
Analysis of the Resulting ImgHid Data Hiding Operation
Android My Secret App
Stego Analysis of the Resulting My Secret Images
Summary
StegDroid
Using the Android Application
Summary
References
Apple iOS Data Hiding
Introduction
Mobile Device Data Hiding Applications
Spy Pix Analysis
Stego Sec Analysis
InvisiLetter Analysis
Summary
References
Operating System Data Hiding
Windows Data Hiding
Alternate Data Streams Reviewed
Stealth Alternate Data Streams
Volume Shadowing
Linux Data Hiding
Linux Filename Trickery
Extended Filesystem Data Hiding
TrueCrypt
References
Virtual Data Hiding
Introduction
Hiding a Virtual Environment
Getting Started
A Review of Virtual Environments
VMware Files
Hiding Data in a VMware Image
Summary
References
Data Hiding in Network Protocols
Introduction
VoIP Data Hiding
Delayed Packet Modification Method
IP Layer Data Hiding, The TTL Field
Investigating Protocol Data Hiding
Summary
References
Forensics and Anti-Forensics
Introduction
Anti-Forensics-Hiding your tracks
Data Hiding Passwords
Hiding Your Tracks
Forensics
Looking for Data Hiding Software
Finding Remaining Artifacts
Identifying and View Cached Images (Cache Auditing Tools)
Evidence in Thumbnails
Searching for Hidden Directories and Files
Network IDS
Summary
References
Mitigation Strategies
Forensic Investigation
Steganography Use Discovery
Steganography Carrier Discovery
Hidden Content Extraction
Mitigation
Network Technologies for detecting Data Hiding
Endpoint Technologies for detecting Data Hiding
Summary
References
Futures
The Future, and the Past
Future Threats
Steganography as a Countermeasure
Current and Futuristic Combined Threats
Summary
Index
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×