Hiding in Plain Sight: Steganography and the Art of Covert Communication

Hiding in Plain Sight: Steganography and the Art of Covert Communication

Paperback

$28.53 $35.00 Save 18% Current price is $28.53, Original price is $35. You Save 18%.

Temporarily Out of Stock Online

Eligible for FREE SHIPPING

Overview

Hiding in Plain Sight: Steganography and the Art of Covert Communication by Eric Cole

  • Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys
  • First book to describe international terrorists' cybersecurity tool of choice in an accessible language
  • Author is a top security consultant for the CIA and provides gripping stories that show how steganography works
  • Appendix provides tools to help people detect and counteract stenanography

Product Details

ISBN-13: 9780471444497
Publisher: Wiley
Publication date: 04/11/2003
Pages: 360
Product dimensions: 7.38(w) x 9.22(h) x 0.78(d)

About the Author

ERIC COLE is currently Chief Scientist for The Sytex Group’s Information Warfare Center, where he heads up cutting-edge research in steganography and network security. Prior to this, Cole worked for more than five years in security for the CIA, during which time he earned six achievement awards and led a team of security professionals in the design and deployment of secure communications systems. Cole continues to consult for many government agencies. He holds several professional certifications and helped develop several of the SANS GIAC security certifications and corresponding courses. He has appeared on CNN, CBS News, and 60 Minutes.

Table of Contents

Acknowledgments.

Introduction.

Part One: Exploring the World of Covert Communication.

Chapter 1: Covert Communication: It’s All Around You.

Chapter 2:” Cryptography Explained.

Chapter 3 :Hiding the Goods with Steganography.

Chapter 4: Digital Watermarking.

Part Two: The Hidden Realm of Steganography.

Chapter 5: Steganography at Large.

Chapter 6: Nuts and Bolts of Steganography.

Chapter 7: Sending Stego Files Across a Network.

Part Three: Making Your Own Communications Secure.

Chapter 8: Cracking Stego and Crypto.

Chapter 9: Developing Your Secure Communications Strategy.

Chapter 10: The Future of Steganography.

Appendix A: Steganography Source Code.

Appendix B: What’s on the CD-ROM.

Index.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews