Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols Michael T. Raggo, Chet Hosmer.
Material type: TextPublication details: Waltham, MA Syngress, c Description: xix 245p:. ill. 23cmISBN: 9781597497435Subject(s): Computer security | Data protectionLOC classification: QA76.9.A25 | R3374 2013Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
BOOK | UNIMY PJ Library | QA76.9.A25 R3374 2013 (Browse shelf (Opens below)) | Available | 102103 |
Total holds: 0
Browsing UNIMY shelves, Shelving location: PJ Library Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
QA76.9.A25 D815 2008 Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / | QA76.9.A25 L68 2012 Low tech hacking street smarts for security professionals | QA76.9.A25 O78 2013 Identity and access management business performance through connected intelligence | QA76.9.A25 R3374 2013 Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols | QA76.9.A25 W458 2007 Principles of incident response and disaster recovery | QA76.9 A43 .M58 1997 Machine Learning | QA76.9 A43 .M58 1997 Machine Learning |
Includes bibliographical references and index.
There are no comments on this title.