Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense

Author:   Nihad Ahmad Hassan (IT Security & Digital Forensics Consultant, Founder of www.DarknessGate.com) ,  Rami Hijazi (Information security consultant, General Manager, MERICLER Inc., Canada)
Publisher:   Syngress Media,U.S.
ISBN:  

9780128044490


Pages:   324
Publication Date:   23 September 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $131.87 Quantity:  
Add to Cart

Share |

Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense


Add your own review!

Overview

Full Product Details

Author:   Nihad Ahmad Hassan (IT Security & Digital Forensics Consultant, Founder of www.DarknessGate.com) ,  Rami Hijazi (Information security consultant, General Manager, MERICLER Inc., Canada)
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 21.60cm , Height: 1.70cm , Length: 27.60cm
Weight:   0.880kg
ISBN:  

9780128044490


ISBN 10:   0128044497
Pages:   324
Publication Date:   23 September 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1. Introduction and Historical Background 2. Data Hiding Using Simple Methods 3. Data Hiding Using Steganographic Techniques 4. Data Hiding Under Windows® OS File Structure 5. Data Hiding Using Encryption Techniques 6. Data Hiding Forensics 7. Anti-Forensic Techniques 8. Future Trends

Reviews

....it comprehensively covers the practical side both for those aiming to hide data and those trying to uncover it. --Security Management


"""….it comprehensively covers the practical side both for those aiming to hide data and those trying to uncover it."" --Security Management"


""….it comprehensively covers the practical side both for those aiming to hide data and those trying to uncover it."" --Security Management


Author Information

Nihad A. Hassan is an independent computer security & forensic consultant. He has been actively conducting research on computer forensic techniques for more than 8 years. Nihad focuses on the subject of computer forensics and anti-forensic techniques in Windows® OS, especially the digital steganography techniques. Nihad has completed numerous technical security consulting engagements involving security architectures, penetration testing, Windows® OS diagnostic reviews, disaster recovery planning and computer crime investigation.He has written thousands of pages of technical documentation for different global companies in the IT and cybersecurity fields in both languages, Arabic & English. His writing style highlights the fact that information is simplified and is presented it in an easy manner, which gives him a wide reputation in this field. Nihad believes that security concerns are best addressed by well-prepared and security-savvy individuals. He also enjoys being involved in security training, education, motivation. His current work is focused on network security, penetration testing, computer forensic, anti-forensics techniques and web security assessment. Nihad has a BSc honors degree in computer science from the University of Greenwich in the UK.You can reach Nihad through:InfoSecurity blog: http://www.DarknessGate.com Personal website: http://www.ThunderWeaver.com Email: nihadhas@gmail.com Rami Hijazi is the General Manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including Object-Oriented Programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc., where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, as well as planning and development advice for IT departments concerning contingency planning.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List