File Size: 5644 KB
Print Length: 270 pages
Page Numbers Source ISBN: 1597497436
Publisher: Syngress; 1 edition (December 31, 2012)
Publication Date: December 31, 2012
Sold by: Digital Services LLC
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #207,433 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #35 in Books > Computers & Technology > Programming > APIs & Operating Environments > Operating Systems Theory #76 in Books > Computers & Technology > Security & Encryption > Encryption #82 in Books > Computers & Technology > Security & Encryption > Cryptography
Okay. But, not rigorous – no math or even example programs. I found an older book “Hiding In Plain Sight” at least has example programs.Bottom line – not for the developer, just the general reader.
This fall, I was privileged to be a student of Chet Hosmer (Utica College Adjunct Professor) in my Masters of Cyber Security coursework. Not surprisingly, he used this book as the primary text for his class, "Access Methods and Data Hiding". As a natural skeptic, I wondered what his reason for requiring his own text as the course textbook was. During the course, I was expected to do in-depth research, conduct hands-on lab assignments, and write research papers regarding the topic of data hiding methods. What I found over and over, was that Chet Hosmer and Michael Raggo were persistently the primary source for nearly every other researcher… and even other experts in the field of data hiding and steganography. Needless to say, this made it difficult to have a breadth of resources to list on my assignments.This book is well written and does a good job of presenting the information. The audience is pretty wide, surprisingly. A moderately technical university student (or advanced high school student) who is interested in the study of steganography and data hiding would definitely be able to gain much information from every chapter of the book. But, for the IT person in the field or for the student with a technical background, this book gives many details and examples for a more in-depth and technical understanding of these data hiding methods. Whatever the case, "Data Hiding" should be considered as a first source in this arena.
This is the most comprehensive book on Steganography and data hiding that I have ever read! It is insightful and a definite "eye opener" to the threats and techniques used in data hiding. It is extremely well written and presented. I highly recommend this book for anyone interested in learning more about Steganography and advanced data hiding techniques. I believe this book would be a valuable resource for students as well as seasoned professionals.
If your looking to learn more on data hiding/steganography look no further. A book that contains as much insight and knowledge on an advanced topic, that isn't a difficult read is hard to come by. Hosmer and Raggo created a book that can be used by students while also providing a wealth of new information to even the most seasoned investigators. Highly recommended.
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices, and Network Protocols is the most beneficial textbook that I’ve ever used. It contains a wide variety of data hiding methods which introduce the student to many of the data hiding methods used today.The aspect of the book that I liked most is that it’s choked full of screenshots to guide a student through the processes of data hiding methods and enhance their understanding of the material. It was like having the teacher right there at my side. The book is not just for the novice security professional. There are links provided throughout for those who wish to dig deeper into the subject matter. All of this combined, made the book thoroughly thought provoking and held my interest throughout. I highly recommend reading this book cover-to-cover.
This book is well written, very informative and easy to comprehend. It really opens your eyes to the threat of Data Hiding. This would be an excellent resource for anyone interested in the world of cyber security. This is a must read!
I have just finished my degree in Cyber Security and this is one of the best textbooks we were asked to use by the University. It was up-to-the-minute and very thorough, while still making the technical information accessible. I would recommend this book for anyone looking to further there knowledge of this subject or pursuing a career in Cyber Security. These two authors are both experts in their field and the proof is in how many expert testimonies on various websites and magazines they have presented.
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Gun Digest's Concealed Carry Guns & Handgun Ammo eShort Collection: Handguns and loads for personal protection recommended by Massad Ayoob. (Concealed Carry eShorts) Gun Digest's Handgun Ammo & Calibers Concealed Carry eShort: Learn the most effective handgun calibers & pistol ammo choices for the self-defense revolver. (Concealed Carry eShorts) Gun Digest's Concealed Carry Gun Ammo eShort: Learn how to choose effective self-defense handgun ammo. (Concealed Carry eShorts) Gun Digest's IDPA Gear, Tactical Drills & Handgun Training eShort: Train for stressfire with essential IDPA drills, handgun training advice, concealed ... CCW exercises. (Concealed Carry eShorts) Create Your Own Operating System: Build, deploy, and test your very own operating systems for the Internet of Things and other devices Mobile Apps Made Simple: The Ultimate Guide to Quickly Creating, Designing and Utilizing Mobile Apps for Your Business - 2nd Edition (mobile application, ... programming, android apps, ios apps) Desarrollo de aplicaciones de multimedia / Multimedia application development (Spanish Edition) Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book (Wiley - IEEE) Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services Applied Cryptography: Protocols, Algorithms, and Source Code in C [ APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C BY Schneier, Bruce ( Author ) Nov-01-1995 Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH) Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and ... (Hacking Freedom and Data Driven Book 2) Integrating UNIX and PC Network Operating Systems Data Analytics: Practical Data Analysis and Statistical Guide to Transform and Evolve Any Business Leveraging the Power of Data Analytics, Data Science, ... (Hacking Freedom and Data Driven Book 2) Telephone Triage Protocols for Nursing (Briggs, Telephone Triage Protocols for Nurses098227) Telephone Triage Protocols for Nurses (Briggs, Telephone Triage Protocols for Nurses098227) Telephone Triage Protocols for Nurses (Briggs, Telephone Triage Protocols for Nurses) Data Architecture: A Primer for the Data Scientist: Big Data, Data Warehouse and Data Vault US Army Technical Manual, ARMY DATA SHEETS FOR CARTRIDGES, CARTRIDGE ACTUATED DEVICES AND PROPELLANT ACTUATED DEVICES, FSC 1377, TM 43-0001-39, 1991