Home :: Books :: Reference  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference

Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Investigator's Guide to Steganography

Investigator's Guide to Steganography

List Price: $79.95
Your Price: $79.95
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: A comprehensive and useful work!
Review: As a security focused manager the more I learn about steganography, the art of hiding messages, the more concerned I become about its security implications. These techniques allow an individual to use secrecy in communications.

I am sure the book aids the investigator, but it helps a manager understand how secrecy has been used in the past and the present as well. A tremendous amount of research must have gone into the book to be so comprehensive. I was already familiar with S-tools and a few other picture file related techniques, but had never considered slight alterations of the space between letters and had never heard of Civil war quilts. The beginning of the book is packed with technique after technique.

The author, Greg Kipper is to be congratulated for such clear writing especially considering how complex the subject gets.

The publisher, CRC Press, went the extra mile to create a very detailed table of contents so the reader can find what they need fast.

The bottom line, this book is an excellent coverage of the subject and yet they packed it into about 200 pages so it is 100% fluff free.

One concern and one wish. The coverage of tools is a bit spotty, the links to stego tools seem to change rapidly and some of the tools do not even have a link. If you can't find a tool you might try: http://www.stegoarchive.com/ that is what I use. I hope this goes to second edition and if so, my wish is that the author will beef up the detection chapter. Greg does such a great job of showing how stego can and has been used in the real world, I would love more information about how I can protect myself and apply detective controls in my organization's network.

Rating: 5 stars
Summary: A comprehensive and useful work!
Review: As a security focused manager the more I learn about steganography, the art of hiding messages, the more concerned I become about its security implications. These techniques allow an individual to use secrecy in communications.

I am sure the book aids the investigator, but it helps a manager understand how secrecy has been used in the past and the present as well. A tremendous amount of research must have gone into the book to be so comprehensive. I was already familiar with S-tools and a few other picture file related techniques, but had never considered slight alterations of the space between letters and had never heard of Civil war quilts. The beginning of the book is packed with technique after technique.

The author, Greg Kipper is to be congratulated for such clear writing especially considering how complex the subject gets.

The publisher, CRC Press, went the extra mile to create a very detailed table of contents so the reader can find what they need fast.

The bottom line, this book is an excellent coverage of the subject and yet they packed it into about 200 pages so it is 100% fluff free.

One concern and one wish. The coverage of tools is a bit spotty, the links to stego tools seem to change rapidly and some of the tools do not even have a link. If you can't find a tool you might try: http://www.stegoarchive.com/ that is what I use. I hope this goes to second edition and if so, my wish is that the author will beef up the detection chapter. Greg does such a great job of showing how stego can and has been used in the real world, I would love more information about how I can protect myself and apply detective controls in my organization's network.

Rating: 4 stars
Summary: A good introduction and reference, but no code.
Review: This book is an excellent introduction to steganography, but most likely you will skim it and then leave it on a shelf for reference. It contains extensive lists of freeware and commercial sources for all types of software related to the field. However, don't expect patches of C or VB code to exemplify concepts. The nuts and bolts are not addressed.


<< 1 >>

© 2004, ReviewFocus or its affiliates