Sold Out
Book Categories |
Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys First book to describe international terrorists' cybersecurity tool of choice in an accessible language Author is a top security consultant for the CIA and provides gripping stories that show how steganography works Appendix provides tools to help people detect and counteract stenanography
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionImpacts and risk assessment of technology for Internet security
X
This Item is in Your InventoryImpacts and risk assessment of technology for Internet security
X
You must be logged in to review the productsX
X
X
Add Impacts and risk assessment of technology for Internet security, , Impacts and risk assessment of technology for Internet security to the inventory that you are selling on WonderClubX
X
Add Impacts and risk assessment of technology for Internet security, , Impacts and risk assessment of technology for Internet security to your collection on WonderClub |