Syngress Certification's MCTS/MCITP solutions are no longer available.
Trim: 7.5 in x 9.25 in
Publication Date: Sep 2012
"Data Hiding" is otherwise known as "anti-forensics" which is: a general term for a set of techniques used as countermeasures to forensic analysis. Sophisticated data hiding techniques continue to evade detection by intrusion detection systems, DLP solutions, and forensic analysts. Detection of steganography techniques used to hide messages with pictures and other files usually go undetected in even the large enterprise networks. Derivative approaches of multi-layer hiding techniques haven't even been addresses in the information security marketplace. Yet issues with espionage, data leakage (just look at wikileaks), and covert communications continue to challenge everyone. This book outlines many of the latest data hiding techniques in a fun and creative format, so as to raise the awareness of these threats to networks and corporations. And hopefully further promote research for detecting these threats.
Michael T. Raggo
, CISSP 20 years of security technology experience in penetration testing, risk management, forensics and security research.
is the Sr. Vice President and Chief Scientist of WetStone Technologies, Inc.
Chapter 1. History of Data Hiding
Chapter 2. Mobile Device Data Hiding
Chapter 3. Windows Operating System Data Hiding
Chapter 4. Linux Operating System Data Hiding
Chapter 5. Storage Devices
Chapter 6. Virtual Machine Hiding
Chapter 7. Steganography
Chapter 8. Forensics/Anti-Forensics Techniques and Detecting Hidden Data
Chapter 9. Hardware Data Hiding
Chapter 10. Multimedia Data Hiding and Detection
Chapter 11. Parallel Processing Attacks
Chapter 12. Jamming Methods