Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hiding in Plain Sight: Steganography and the Art of Covert Communication

Buy
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted messages in ordinary-looking data files, making the very existence of the messages practically undetectable. Although steganography is not a new field and has played a critical part in secret communication throughout history, few people understand exactly how it works today. This detailed, practical guide changes that–whether your goal is to add an extra level of security to business or government communications or to detect and counter steganography when it’s used by criminals or terrorists.

By teaching you how to protect your vital data and detect information attacks against networks, Cole aims to expose security threats so you can take action to minimize the damage going forward. He explores such topics as:

  • The basics of cryptography and digital water- marking, two companion technologies that are often used in concert with steganography
  • Who is using steganography and some of the ethical and legal challenges our society faces when privacy and security collide
  • The nuts and bolts of using steganography tools and transmitting hidden data over networks
  • Methods you can use to crack steganography and cryptography
  • "Steganography in Action Stories"–fictionalized versions of the kind of secret communication scenarios Cole observed during his years working for the CIA and as a security consultant
  • Ideas for keeping your own communications secure
  • Where steganography is headed in the future

The CD-ROM includes not only valuable original source code for steganography techniques discussed in the book, but also several popular steganography tools, and color versions of original and manipulated images from the book for you to compare.

About the Author
ERIC COLE is currently Chief Scientist for The Sytex Group’s Information Warfare Center, where he heads up cutting-edge research in steganography and network security. Prior to this, Cole worked for more than five years in security for the CIA, during which time he earned six achievement awards and led a team of security professionals in the design and deployment of secure communications systems. Cole continues to consult for many government agencies. He holds several professional certifications and helped develop several of the SANS GIAC security certifications and corresponding courses. He has appeared on CNN, CBS News, and 60 Minutes.

(HTML tags aren't allowed.)

C# 5 First Look
C# 5 First Look

C# is a wonderfully expressive and powerful language that lets you focus on your application rather than low level boilerplate. Over the last decade, the C# compiler has evolved to include many features from dynamic and functional languages, all while remaining statically typed. Most recently, it also tackles the proliferation of concurrent...

Artificial Cognition Systems
Artificial Cognition Systems
The central questions confronting artificial intelligence and cognitive science revolve around the nature of meaning and of mind. Minds are presumed to be the processors of mental content, where that content has the capacity to influence our speech and other behavior. The hard part is figuring out how that is done. Mental states must exercise...
Handbook of Enterprise Integration
Handbook of Enterprise Integration

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond...


Microsoft® .NET Distributed Applications: Integrating XML Web Services and .NET Remoting
Microsoft® .NET Distributed Applications: Integrating XML Web Services and .NET Remoting

Make the jump to distributed application programming using the .NET Framework—and introduce a new level of performance, scalability, and security to your network and enterprise applications. Expert .NET developer Matthew MacDonald shares proven techniques for fully exploiting .NET Remoting, XML Web services, and other...

Ten Ton Dreamweaver
Ten Ton Dreamweaver
If you're thinking about creating or maintaining Web sites, you're likely to turn to Dreamweaver, the de facto software tool of choice for Web design today. What could be a chore, however, becomes a fun and fascinating challenge with this comprehensive yet clever guide. Author Geoff Blake turns a technical topic...
Empirical Social Choice: Questionnaire-Experimental Studies on Distributive Justice
Empirical Social Choice: Questionnaire-Experimental Studies on Distributive Justice

Since Aristotle, many different theories of distributive justice have been proposed, by philosophers as well as social scientists. The typical approach within social choice theory is to assess these theories in an axiomatic way - most of the time the reader is confronted with abstract reasoning and logical deductions. This book shows that...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy