
Data Hiding Techniques in Windows OS
A Practical Approach to Investigation and Defense
Description
Key Features
- A brief history of steganography since early inception to present day
- Simple methods to hide your data without using any third party tools, and different ways to investigate and explore hidden data
- Exploiting multimedia files to conceal data using text, image, video and audio steganography
- Exploiting Windows® NTFS file system to hide your secret data
- A wide array of encryption techniques to protect your confidential data and securing your online communications
- Using cryptographic anonymity tools to conceal your identity online
- Explaining how hidden data could be used to plant a malware and launch sophisticated attacks against computer systems
- Methods to crack steganography and cryptography
- A chapter dedicated to anti-forensic techniques, detailing how to conceal data when using a Windows® machine
Readership
Information Security professionals, consultants, analysts, IT specialists, forensic examiners and investigators, InfoSec consultants, and Infosec students
Table of Contents
1. Introduction and Historical Background
2. Data Hiding Using Simple Methods
3. Data Hiding Using Steganographic Techniques
4. Data Hiding Under Windows® OS File Structure
5. Data Hiding Using Encryption Techniques
6. Data Hiding Forensics
7. Anti-Forensic Techniques
8. Future Trends
Product details
- No. of pages: 324
- Language: English
- Copyright: © Syngress 2016
- Published: September 8, 2016
- Imprint: Syngress
- Paperback ISBN: 9780128044490
- eBook ISBN: 9780128044964
About the Authors
Nihad Hassan
Nihad has completed numerous technical security consulting engagements involving security architectures, penetration testing, Windows® OS diagnostic reviews, disaster recovery planning and computer crime investigation.
He has written thousands of pages of technical documentation for different global companies in the IT and cybersecurity fields in both languages, Arabic & English. His writing style highlights the fact that information is simplified and is presented it in an easy manner, which gives him a wide reputation in this field.
Nihad believes that security concerns are best addressed by well-prepared and security-savvy individuals. He also enjoys being involved in security training, education, motivation. His current work is focused on network security, penetration testing, computer forensic, anti-forensics techniques and web security assessment. Nihad has a BSc honors degree in computer science from the University of Greenwich in the UK.
You can reach Nihad through:
InfoSecurity blog: http://www.DarknessGate.com
Personal website: http://www.ThunderWeaver.com
Email: nihadhas@gmail.com
Affiliations and Expertise
Rami Hijazi
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Data Hiding Techniques in Windows OS"