Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Hassan, Nihad Ahmad, author.

Title Data hiding techniques in Windows OS : a practical approach to investigation and defense / Nihad Admad Hassan, Rami Hijazi ; Helvi Salminen, technical editor.

Publication Info. Cambridge, MA : Syngress, [2017]
©2017
QR Code
Description 1 online resource (1 volume) : illustrations
Bibliography Includes bibliographical references and index.
Contents Machine generated contents note: 1. Introduction and Historical Background -- Introduction -- Classical Cipher Types -- Substitution Cipher -- Transposition Cipher -- Other Ciphers and Codes -- Difference Between Substitution and Transposition Cipher -- Practicing Old Ciphers Using Modem Computing -- Modern Cryptography Systems -- Secret Key Cryptography -- Public Key Cryptography -- Digital Signature -- Cryptographic Hash Function -- Steganography -- What Is Steganography? -- Comparing Steganography and Cryptography -- Steganography Types -- Watermarking -- Watermarking Types -- Compare Steganography and Watermarking -- Anonymity -- Summary -- References -- Bibliography -- 2. Data Hiding Using Simple Methods -- Introduction -- Bit-Shifting Data Hiding -- Hiding Data Inside Rich Text Format Documents -- Renaming Files -- Matching File Signatures and File Extensions -- Hiding Data in Compressed Files -- Hiding Data Through File Splitting -- Hiding Data in Microsoft® Office Documents -- Hidden Text -- Hidden Data Within Document Attributes (Metadata) -- White Font -- Hiding Data by Exploiting OLE Structured Storage -- Self-Encrypt MS Office® Document -- Hiding Inside MS Excel® Spreadsheet -- Data Hiding Inside Image Attributes (Image Metadata) -- Summary -- References -- Bibliography -- 3. Data Hiding Using Steganographic Techniques -- Introduction -- Text Steganography -- Format-Based Steganography -- Random and Statistical Generation -- Linguistic-Based Methods -- Hiding Inside MS Office® Documents Based on OOXML File Format -- Webpage Text Steganography -- Hiding Secret Messages Inside Twitter Updates -- Image Steganography -- Digital Image Basic Concepts -- Image Steganographic Techniques -- Digital Media Steganography Tools -- Data Hiding Inside Audio Files -- Audio Files Basic Concepts -- Audio Steganography Types -- Data Hiding Using Other Digital Media Types -- Data Hiding Inside PDF Documents -- Data Hiding Inside Program Binaries -- Summary -- References -- Bibliography -- 4. Data Hiding Under Windows® OS File Structure -- Introduction -- Data Hiding Using Alternate Data Stream -- What Is the New Technology File System? -- What Is an Alternate Data Stream? -- How Can We Use Alternate Data Streams to Hide Files? -- Hiding Executable Code in Alternate Data Stream Files -- Important Notes About Using Alternate Data Stream in Hiding Files -- How to Delete Alternate Data Stream Files -- Detecting Alternate Data Stream Files -- Data Hiding Using Stealth Alternate Data Stream -- Hiding Data Inside Windows® Restoration Points -- Hiding Data Inside Windows® Registry -- Hiding in a File's Slack Space -- Understanding Hard Disk Drives -- File Allocation Table -- Hidden Partitions -- Hidden Partitions Under Windows® OS -- Creating a Hidden Partition Within a USB Zip Drive -- Data Hiding Within Master File Table -- Data Hiding in Disk Bad Blocks -- Data Hiding Under Computer Hardware Level -- Data Hiding Inside Host Protected Area -- Hiding Data in Device Configuration Overlay -- Summary -- References -- Bibliography -- 5. Data Hiding Using Encryption Techniques -- Introduction -- Security Awareness Corners -- Human Security -- Device Security -- Message Security -- Network Security -- Anonymous Operating System -- Tails -- Ubuntu Privacy Remix -- Other Security Distributions -- Advice When Using Security Operating Systems -- Portable Stick Computer -- Disk Encryption -- Encrypting Partitions Using BitLocker -- Creating Encrypted Vaults -- Single File Encryption -- Cloud Storage Encryption -- Discussion of Security Level in Disk Encryption -- Anonymize Your Location Online -- Using the TOR Browser -- Virtual Private Networks -- SSH Tunneling -- Using Proxy Server -- Anonymous Search Engine -- Web Browser Privacy Add-Ons -- Secure Anonymous File Sharing -- Encrypting Email Communications -- Email Encryption Using Gpg4Win -- Open PGP Encryption for Webmail Using the Mailvelope Browser Extension -- Secure Web Mail Providers -- Encrypt Instant Messaging, Video Calls, and VOIP Sessions -- What Are the Risks? -- Off-the-Record-Messaging and Pidgin -- Secure Video Calling Service Using Gruveo -- Secure Anonymous Calling Service Using GHOST CALL -- Retroshare Secure Social Platform -- TOR Messenger -- Complete Anonymous IM Using Ricochet -- Create and Maintain Secure Passwords -- Password Best Practice -- Password Generation Tools -- Password-Saving Techniques -- Password Manager Tools -- Miscellaneous Security Hints and Best Practices -- Summary -- References -- Bibliography -- 6. Data Hiding Forensics -- Introduction -- Understanding Computer Forensics -- Computer Forensic Process -- Differences Between Computer Forensics and Other Computing Domains -- Need for Digital Evidence -- Steganalysis -- Steganalysis Methods -- Destroying Hidden Data -- Steganalysis of Digital Media Files -- Text Document Steganalysis -- Image Forensics -- Audio Forensics -- Video Forensics -- Digital Files Metadata Forensic -- Windows Forensics -- Capture Volatile Memory -- Capture Disk Drive -- Deleted Files Recovery -- Windows Registry Analysis -- Forensic Analysis of Windows Prefetch Files -- Windows Minidump Files Forensics -- Windows Thumbnail Forensics -- File Signature Analysis -- File Attributes Analysis -- Discover Hidden Partitions -- Detect Alternative Data Streams -- Investigating Windows Volume Shadow Copy -- Virtual Memory Analysis -- Windows Password Cracking -- Host Protected Area and Device Configuration Relay Forensic -- Examining Encrypted Files -- Summary -- References -- Bibliography -- 7. Antiforensic Techniques -- Introduction -- Antiforensics Goals -- Data Hiding General Advice -- Data Destruction -- Hard Disk Wiping -- Manipulating Digital File Metadata -- Windows Antiforensics Techniques -- Configure Windows for Better Privacy -- Disable Recycle Bin -- Registry Antiforensics -- Disable Windows Hibernation -- Disable Windows Virtual Memory (Paging File) -- Disable System Restore Points and File History -- Disable Windows Thumbnail Cache -- Disable Windows Prefetch Feature -- Disable Windows Logging -- Disable Windows® Password Hash Extraction -- Clearing Digital Footprints -- Live CDs and Bootable USB Tokens -- Virtual Machines -- Using Portable Applications -- Direct Attack Against Forensic Software -- Summary -- References -- Bibliography -- 8. Future Trends -- Introduction -- Future of Encryption -- Data Stored in Cloud Computing -- Visualization Technology -- Data Hiding in Enterprise Networks -- Data Concealment -- Data Leakage Prevention -- Streaming Protocols -- Wireless Networks and Future Networking Protocols -- Data Hiding in Mobile Devices -- Anonymous Networks -- Summary -- References -- Bibliography.
Subject Data encryption (Computer science)
Data protection.
Chiffrement (Informatique)
Protection de l'information (Informatique)
Data encryption (Computer science)
Data protection
Added Author Hijazi, Rami, author.
Salminen, Helvi, editor.
ISBN 9780128044964
0128044969
0128044497
9780128044490
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information