語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data hiding techniques in Windows OS...
~
Hassan, Nihad Ahmad,
FindBook
Google Book
Amazon
博客來
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data hiding techniques in Windows OS/ Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor.
其他題名:
a practical approach to investigation and defense /
作者:
Hassan, Nihad Ahmad,
其他作者:
Hijazi, Rami,
出版者:
Cambridge, MA :Syngress, : 2017.,
面頁冊數:
1 online resource :ill.
標題:
Data encryption (Computer science) -
電子資源:
https://www.sciencedirect.com/science/book/9780128044490
ISBN:
9780128044964 (electronic bk.)
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
Hassan, Nihad Ahmad,
Data hiding techniques in Windows OS
a practical approach to investigation and defense /[electronic resource] :Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor. - Cambridge, MA :Syngress,2017. - 1 online resource :ill.
Includes bibliographical references and index.
Introduction and Historical Background --Machine generated contents note:
ISBN: 9780128044964 (electronic bk.)Subjects--Topical Terms:
579162
Data encryption (Computer science)
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Data hiding techniques in Windows OS = a practical approach to investigation and defense /
LDR
:08049cmm a2200265 a 4500
001
2246065
006
m o d
007
cr unu||||||||
008
211223s2017 maua gob 001 0 eng d
020
$a
9780128044964 (electronic bk.)
020
$a
0128044969 (electronic bk.)
020
$a
9780128044490
020
$a
0128044497
035
$a
(OCoLC)1047829629
035
$a
ocn960211534
040
$a
UMI
$b
eng
$c
UMI
$d
STF
$d
OCLCF
$d
OCLCQ
$d
TOH
$d
DEBBG
$d
IDEBK
$d
DEBSZ
$d
OCLCQ
$d
UOK
$d
CEF
$d
KSU
$d
OCLCQ
$d
INT
$d
AU@
$d
WYU
$d
OCLCQ
$d
UAB
$d
OCLCQ
$d
VLB
$d
LVT
041
0
$a
eng
050
4
$a
QA76.9.A25
082
0 4
$a
005.82
$2
23
100
1
$a
Hassan, Nihad Ahmad,
$e
author.
$3
3509026
245
1 0
$a
Data hiding techniques in Windows OS
$h
[electronic resource] :
$b
a practical approach to investigation and defense /
$c
Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor.
260
$a
Cambridge, MA :
$b
Syngress,
$c
2017.
300
$a
1 online resource :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0 0
$g
Machine generated contents note:
$g
1.
$t
Introduction and Historical Background --
$t
Introduction --
$t
Classical Cipher Types --
$t
Substitution Cipher --
$t
Transposition Cipher --
$t
Other Ciphers and Codes --
$t
Difference Between Substitution and Transposition Cipher --
$t
Practicing Old Ciphers Using Modem Computing --
$t
Modern Cryptography Systems --
$t
Secret Key Cryptography --
$t
Public Key Cryptography --
$t
Digital Signature --
$t
Cryptographic Hash Function --
$t
Steganography --
$t
What Is Steganography? --
$t
Comparing Steganography and Cryptography --
$t
Steganography Types --
$t
Watermarking --
$t
Watermarking Types --
$t
Compare Steganography and Watermarking --
$t
Anonymity --
$t
Summary --
$t
References --
$t
Bibliography --
$g
2.
$t
Data Hiding Using Simple Methods --
$t
Introduction --
$t
Bit-Shifting Data Hiding --
$t
Hiding Data Inside Rich Text Format Documents --
$t
Renaming Files --
$t
Matching File Signatures and File Extensions --
$t
Hiding Data in Compressed Files --
$t
Hiding Data Through File Splitting --
$t
Hiding Data in Microsoft® Office Documents --
$t
Hidden Text --
$t
Hidden Data Within Document Attributes (Metadata) --
$t
White Font --
$t
Hiding Data by Exploiting OLE Structured Storage --
$t
Self-Encrypt MS Office® Document --
$t
Hiding Inside MS Excel® Spreadsheet --
$t
Data Hiding Inside Image Attributes (Image Metadata) --
$t
Summary --
$t
References --
$t
Bibliography --
$g
3.
$t
Data Hiding Using Steganographic Techniques --
$t
Introduction --
$t
Text Steganography --
$t
Format-Based Steganography --
$t
Random and Statistical Generation --
$t
Linguistic-Based Methods --
$t
Hiding Inside MS Office® Documents Based on OOXML File Format --
$t
Webpage Text Steganography --
$t
Hiding Secret Messages Inside Twitter Updates --
$t
Image Steganography --
$t
Digital Image Basic Concepts --
$t
Image Steganographic Techniques --
$t
Digital Media Steganography Tools --
$t
Data Hiding Inside Audio Files --
$t
Audio Files Basic Concepts --
$t
Audio Steganography Types --
$t
Data Hiding Using Other Digital Media Types --
$t
Data Hiding Inside PDF Documents --
$t
Data Hiding Inside Program Binaries --
$t
Summary --
$t
References --
$t
Bibliography --
$g
4.
$t
Data Hiding Under Windows® OS File Structure --
$t
Introduction --
$t
Data Hiding Using Alternate Data Stream --
$t
What Is the New Technology File System? --
$t
What Is an Alternate Data Stream? --
$t
How Can We Use Alternate Data Streams to Hide Files? --
$t
Hiding Executable Code in Alternate Data Stream Files --
$t
Important Notes About Using Alternate Data Stream in Hiding Files --
$t
How to Delete Alternate Data Stream Files --
$t
Detecting Alternate Data Stream Files --
$t
Data Hiding Using Stealth Alternate Data Stream --
$t
Hiding Data Inside Windows® Restoration Points --
$t
Hiding Data Inside Windows® Registry --
$t
Hiding in a File's Slack Space --
$t
Understanding Hard Disk Drives --
$t
File Allocation Table --
$t
Hidden Partitions --
$t
Hidden Partitions Under Windows® OS --
$t
Creating a Hidden Partition Within a USB Zip Drive --
$t
Data Hiding Within Master File Table --
$t
Data Hiding in Disk Bad Blocks --
$t
Data Hiding Under Computer Hardware Level --
$t
Data Hiding Inside Host Protected Area --
$t
Hiding Data in Device Configuration Overlay --
$t
Summary --
$t
References --
$t
Bibliography --
$g
5.
$t
Data Hiding Using Encryption Techniques --
$t
Introduction --
$t
Security Awareness Corners --
$t
Human Security --
$t
Device Security --
$t
Message Security --
$t
Network Security --
$t
Anonymous Operating System --
$t
Tails --
$t
Ubuntu Privacy Remix --
$t
Other Security Distributions --
$t
Advice When Using Security Operating Systems --
$t
Portable Stick Computer --
$t
Disk Encryption --
$t
Encrypting Partitions Using BitLocker --
$t
Creating Encrypted Vaults --
$t
Single File Encryption --
$t
Cloud Storage Encryption --
$t
Discussion of Security Level in Disk Encryption --
$t
Anonymize Your Location Online --
$t
Using the TOR Browser --
$t
Virtual Private Networks --
$t
SSH Tunneling --
$t
Using Proxy Server --
$t
Anonymous Search Engine --
$t
Web Browser Privacy Add-Ons --
$t
Secure Anonymous File Sharing --
$t
Encrypting Email Communications --
$t
Email Encryption Using Gpg4Win --
$t
Open PGP Encryption for Webmail Using the Mailvelope Browser Extension --
$t
Secure Web Mail Providers --
$t
Encrypt Instant Messaging, Video Calls, and VOIP Sessions --
$t
What Are the Risks? --
$t
Off-the-Record-Messaging and Pidgin --
$t
Secure Video Calling Service Using Gruveo --
$t
Secure Anonymous Calling Service Using GHOST CALL --
$t
Retroshare Secure Social Platform --
$t
TOR Messenger --
$t
Complete Anonymous IM Using Ricochet --
$t
Create and Maintain Secure Passwords --
$t
Password Best Practice --
$t
Password Generation Tools --
$t
Password-Saving Techniques --
$t
Password Manager Tools --
$t
Miscellaneous Security Hints and Best Practices --
$t
Summary --
$t
References --
$t
Bibliography --
$g
6.
$t
Data Hiding Forensics --
$t
Introduction --
$t
Understanding Computer Forensics --
$t
Computer Forensic Process --
$t
Differences Between Computer Forensics and Other Computing Domains --
$t
Need for Digital Evidence --
$t
Steganalysis --
$t
Steganalysis Methods --
$t
Destroying Hidden Data --
$t
Steganalysis of Digital Media Files --
$t
Text Document Steganalysis --
$t
Image Forensics --
$t
Audio Forensics --
$t
Video Forensics --
$t
Digital Files Metadata Forensic --
$t
Windows Forensics --
$t
Capture Volatile Memory --
$t
Capture Disk Drive --
$t
Deleted Files Recovery --
$t
Windows Registry Analysis --
$t
Forensic Analysis of Windows Prefetch Files --
$t
Windows Minidump Files Forensics --
$t
Windows Thumbnail Forensics --
$t
File Signature Analysis --
$t
File Attributes Analysis --
$t
Discover Hidden Partitions --
$t
Detect Alternative Data Streams --
$t
Investigating Windows Volume Shadow Copy --
$t
Virtual Memory Analysis --
$t
Windows Password Cracking --
$t
Host Protected Area and Device Configuration Relay Forensic --
$t
Examining Encrypted Files --
$t
Summary --
$t
References --
$t
Bibliography --
$g
7.
$t
Antiforensic Techniques --
$t
Introduction --
$t
Antiforensics Goals --
$t
Data Hiding General Advice --
$t
Data Destruction --
$t
Hard Disk Wiping --
$t
Manipulating Digital File Metadata --
$t
Windows Antiforensics Techniques --
$t
Configure Windows for Better Privacy --
$t
Disable Recycle Bin --
$t
Registry Antiforensics --
$t
Disable Windows Hibernation --
$t
Disable Windows Virtual Memory (Paging File) --
$t
Disable System Restore Points and File History --
$t
Disable Windows Thumbnail Cache --
$t
Disable Windows Prefetch Feature --
$t
Disable Windows Logging --
$t
Disable Windows® Password Hash Extraction --
$t
Clearing Digital Footprints --
$t
Live CDs and Bootable USB Tokens --
$t
Virtual Machines --
$t
Using Portable Applications --
$t
Direct Attack Against Forensic Software --
$t
Summary --
$t
References --
$t
Bibliography --
$g
8.
$t
Future Trends --
$t
Introduction --
$t
Future of Encryption --
$t
Data Stored in Cloud Computing --
$t
Visualization Technology --
$t
Data Hiding in Enterprise Networks --
$t
Data Concealment --
$t
Data Leakage Prevention --
$t
Streaming Protocols --
$t
Wireless Networks and Future Networking Protocols --
$t
Data Hiding in Mobile Devices --
$t
Anonymous Networks --
$t
Summary --
$t
References --
$t
Bibliography.
588
0
$a
Online resource; title from title page (viewed October 10, 2016).
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Data protection.
$3
590548
650
7
$a
COMPUTERS
$x
Computer Science.
$2
bisacsh
$3
1458330
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Hijazi, Rami,
$e
author.
$3
3509027
700
1
$a
Salminen, Helvi,
$e
editor.
$3
3509028
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128044490
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9406560
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入