Software: small library, book collectors:

Small Handy Library Manager: run your library in seconds, a good balance between power and simplicity.

Small Library Pro: database maintenance system for small private, public, or corporate libraries.

Book Organizer Advantage: book inventory software for book collectors.

Books  >   Computers and Internet : General : 

Investigator's Guide to Steganography

Kipper, Gregory

Auerbach Publications
Published:October 1, 2003

Read More, Buy It

Description: From Book News, Inc.
Meaning literally "covered writing," steganography is a type of communication in which secret messages are "hidden in plain sight"--appearing as normal graphic, video, or sound files. Aimed at professionals in law enforcement and cyber-forensics, this text moves from a description of the basics types of steganography through the specifics of how digital steganography and watermarking work. Finally, IT security consultant Kipper offers suggestions for detecting and defeating steganography attacks. Distributed by CRC.Copyright # 2004 Book News, Inc., Portland, OR

Product Description:
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future. It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Bestselling and bargain books: Librarians, book collectors

#commissionsearned * Search bestsellers
* Search bargain books
* Other books

Read More, Buy It

Track your book collections, book libraries with our software:

- tiny libraries, personal book collections: try our simple book organizer
- for small libraries we offer small and powerful library software for Windows

PrimaSoft, as an Amazon Associate, receives a commission from qualifying purchases made on the affiliate links we share.

Copyright © 2019 · All Rights Reserved · PrimaSoft PC