Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
Nihad Ahmad Hassan, Rami Hijazi
- 出版商: Syngress Media
- 出版日期: 2016-09-19
- 售價: $1,750
- 貴賓價: 9.5 折 $1,663
- 語言: 英文
- 頁數: 324
- 裝訂: Paperback
- ISBN: 0128044497
- ISBN-13: 9780128044490
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$1,200$948 -
$1,685$1,601 -
$480$408 -
$1,646Operating System Concepts, 9/e (IE-Paperback)
-
$550$550 -
$490$417 -
$980$774 -
$980$735 -
$980$774 -
$880$695 -
$480$379 -
$699$552 -
$580$493 -
$580$493 -
$580$458 -
$550$413 -
$560$476 -
$301神經網絡與深度學習
-
$288深度學習導論及案例分析
-
$480$379 -
$450$383 -
$520$442 -
$500$395 -
$580$458 -
$490$382
相關主題
商品描述
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files.
Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data.
Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques.
Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world.
Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way.
Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.
This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
A brief history of steganography since early inception to present day
Simple methods to hide your data without using any third party tools, and different ways to investigate and explore hidden data
Exploiting multimedia files to conceal data using text, image, video and audio steganography
Exploiting Windows® NTFS file system to hide your secret data
A wide array of encryption techniques to protect your confidential data and securing your online communications
Using cryptographic anonymity tools to conceal your identity online
Explaining how hidden data could be used to plant a malware and launch sophisticated attacks against computer systems
Methods to crack steganography and cryptography
A chapter dedicated to anti-forensic techniques, detailing how to conceal data when using a Windows® machine
商品描述(中文翻譯)
在數位世界中,隨著背後的技術不斷演進,保護線上通訊的需求也日益增加。目前有許多技術可用於加密和保護我們的通訊渠道。資料隱藏技術可以將資料機密性提升到新的水平,因為我們可以將秘密訊息隱藏在普通、看似正常的資料檔案中。
隱寫術是隱藏資料的科學。它有幾種分類,每種類型都有自己的隱藏技術。隱寫術自古以來在戰爭中的秘密通訊中扮演著重要角色。近年來,一些電腦使用者成功地利用他們的Windows®電腦來隱藏他們的私人資料。
企業對於濫用資料隱藏技術也深感擔憂。許多雇主對於他們寶貴的資訊如何輕易地外洩感到驚訝。在許多法律案件中,即使實施了所有的安全措施,一名不滿的員工仍然成功地使用簡單的數位隱藏技術竊取公司的私人資料。
生活在受壓迫政權控制下的人權活動家需要一種方法來進行網上通訊,而不會引起監控系統的注意,這些系統會不斷掃描進出的網絡流量,尋找有趣的關鍵詞和其他痕跡。同樣的情況也適用於全球各地的記者和告密者。
電腦取證調查人員、執法人員、情報機構和IT安全專業人員需要一本指南,告訴他們罪犯可以在Windows®操作系統和多媒體檔案中隱藏他們的資料的地方,以及他們如何快速發現隱藏的資料並以取證方式檢索它。
《Windows操作系統中的資料隱藏技術》是對所有這些擔憂的回應。大多數書籍通常以學術方法來處理資料隱藏主題,介紹每種隱藏技術算法背後的長數學方程式,通常針對的是在學術領域工作的人。這本書教導專業人士和最終用戶如何在地球上最常用的操作系統Windows®下隱藏和發現隱藏的資料,只需要基本的Windows®主要功能知識,技術以易於在您的電腦上直接實施的方式呈現。
這是一本實用指南,讓您了解、檢測和使用當今最流行的在Windows®機器下隱藏和探索隱藏資料的技術,涵蓋從XP到Windows® 10的所有Windows®版本。從羅馬皇帝尤利烏斯·凱撒和他簡單的密碼方法,到美國國家安全局部署的監控程序,監視通訊和網絡流量,本書將教您保護數位資料的一切知識,使用隱寫和匿名加密技術。以簡單的風格撰寫,只需要對主要Windows®功能的基本知識,技術以易於直接在您的電腦上實施的方式呈現。
從早期的隱寫術起源到現代的簡要歷史
不使用任何第三方工具隱藏您的資料的簡單方法,以及調查和探索隱藏資料的不同方式
利用多媒體檔案進行隱藏資料,包括文字、圖像、視頻和音頻隱寫術
利用Windows® NTFS檔案系統隱藏您的秘密資料
廣泛的加密技術,以保護您的機密資料和確保您的網上通訊安全
使用密碼學和匿名技術保護您的數位資料的今日最流行方法。```