- Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys
- First book to describe international terrorists' cybersecurity tool of choice in an accessible language
- Author is a top security consultant for the CIA and provides gripping stories that show how steganography works
- Appendix provides tools to help people detect and counteract stenanography
|Product dimensions:||7.38(w) x 9.22(h) x 0.78(d)|
About the Author
ERIC COLE is currently Chief Scientist for The Sytex Group’s Information Warfare Center, where he heads up cutting-edge research in steganography and network security. Prior to this, Cole worked for more than five years in security for the CIA, during which time he earned six achievement awards and led a team of security professionals in the design and deployment of secure communications systems. Cole continues to consult for many government agencies. He holds several professional certifications and helped develop several of the SANS GIAC security certifications and corresponding courses. He has appeared on CNN, CBS News, and 60 Minutes.
Table of Contents
Part One: Exploring the World of Covert Communication.
Chapter 1: Covert Communication: It’s All Around You.
Chapter 2:” Cryptography Explained.
Chapter 3 :Hiding the Goods with Steganography.
Chapter 4: Digital Watermarking.
Part Two: The Hidden Realm of Steganography.
Chapter 5: Steganography at Large.
Chapter 6: Nuts and Bolts of Steganography.
Chapter 7: Sending Stego Files Across a Network.
Part Three: Making Your Own Communications Secure.
Chapter 8: Cracking Stego and Crypto.
Chapter 9: Developing Your Secure Communications Strategy.
Chapter 10: The Future of Steganography.
Appendix A: Steganography Source Code.
Appendix B: What’s on the CD-ROM.