|
Product Description
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Customers Who Bought This Item Also Bought
- Cybercrime and Digital Forensics: An Introduction
- Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
- Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
- Rtfm: Red Team Field Manual
- The Linux Command Line, 2nd Edition: A Complete Introduction
- Kali Linux Revealed: Mastering the Penetration Testing Distribution
- Cyberpower and National Security
- Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware
*If this is not the "Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Pr" product you were looking for, you can check the other results by clicking this link. Details were last updated on Nov 1, 2024 21:56 +08.