Data Hiding and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Data Hiding on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols [Paperback]

Michael T. Raggo , Chet Hosmer

RRP: 30.99
Price: 28.65 & FREE Delivery in the UK. Details
You Save: 2.34 (8%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Wednesday, 23 April? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 27.22  
Paperback 28.65 Trade-In Store
Did you know you can use your mobile to trade in your unwanted books for an Gift Card to spend on the things you want? Visit the Books Trade-In Store for more details or check out the Trade-In Amazon Mobile App Guidelines on how to trade in using a smartphone. Learn more.

Book Description

9 Nov 2012 1597497436 978-1597497435
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. * Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7* Dives deep into the less known approaches to data hiding, covert communications, and advanced malware* Includes never before published information about next generation methods of data hiding* Outlines a well-defined methodology for countering threats* Looks ahead at future predictions for data hiding

Product details

More About the Authors

Discover books, learn about writers, and more.

Product Description


"This is one of those threats that confounds and frustrates digital forensics examiners today. Steganography is only used by the more sophisticated bad guys. This book helps to bring this threat out from behind the green door." -Jim Christy, Special Agent (Ret), HQE/Director, Futures Exploration (FX)/Department of Defense Cyber Crime Center (DC3) "This book is the most comprehensive text yet published about Steganography, with coverage of everything from the history of the art and science of hiding data to the myriad applications and mechanisms of digital stego. This is a must-read for any serious student of the field." -Gary C. Kessler, Ph.D., CCE, CISSP / Embry-Riddle Aeronautical University "From the age old "cloak and dagger" images; to the age old fable of "which came first, the chicken or the egg", data hiding is the backbone of information security or insecurity. Data Hiding brings the past, present, and future of data hiding out from under the cloak into the sunlight. Giving real world examples and more importantly how to defend against them." -Richard Rushing, CISO, Motorola Mobility

About the Author

Michael Raggo (CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI) applies over 20 years of security technology experience and evangelism to the technical delivery of Security Solutions. Mr. Raggo's technology experience includes penetration testing, wireless security assessments, compliance assessments, firewall and IDS/IPS deployments, mobile device security, incident response and forensics, and security research, and is a former security trainer. In addition, Mr. Raggo conducts ongoing independent research on various Data Hiding techniques including steganography. Mr. Raggo has presented on various security topics at numerous conferences around the world (BlackHat, DefCon, SANS, DoD Cyber crime, OWASP, InfoSec, etc.) and has briefed the Pentagon on Steganograpy and Steganalysis techniques. Chet Hosmer is the Chief Scientist and Sr. Vice President at Allen Corporation and a co-founder of WetStone Technologies, Inc. Chet has been researching and developing technology and training surrounding data hiding, steganography and watermarking for over a decade. He has made numerous appearances to discuss the threat steganography poses including National Public Radio's Kojo Nmadi show, ABC's Primetime Thursday, NHK Japan, CrimeCrime TechTV and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to steganography and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, and Wired magazine. Chet also serves as a visiting professor at Utica college where he teaches in the Cybersecurity Graduate program. Chet delivers keynote and plenary talks on various cyber security related topics around the world each year.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on (beta) 4.5 out of 5 stars  4 reviews
3.0 out of 5 stars Data Hiding 22 Feb 2014
By Robert K. Ferguson - Published on
Format:Paperback|Verified Purchase
The book is well written and the author took care to present some potentially technical material in a way that non-technical folks can assimilate. The reason for the "three" rating is that the book's emphasis is on steganography and I was looking for/hoping to learn other data hiding methods/techniques/mechanisms.
4 of 7 people found the following review helpful
5.0 out of 5 stars A Comprehensive Look at Steganography and Data Hiding Techniques 5 Dec 2012
By Carlton Jeffcoat, CISSP - Published on
I have taken Mr. Hosmer's Advanced Steganography course, heard him speak at cyber security and forensics conferences on the topic of data hiding and steganography/steganalysis, and follow his monthly "DFI News" articles and annual steg/data hiding reports. As a result I had high expectations for this book, and Hosmer and Raggo did not disappoint me. The book provides a comprehensive look into the subject. It will be useful to both those new to the field as well as to the experienced investigator who needs to stay abreadst of the advances made in steganography techniques for multimedia, VoIP, and mobile devices. This is a field that needs to be taken seriously not just by law enforcement and the intelligence community, but by any organization concerned with the loss of its intellectual property through covert channels.
4 of 7 people found the following review helpful
5.0 out of 5 stars Great Book!! 29 Nov 2012
By CompGuy - Published on
I highly recommend this book!! Its in depth look at data hiding techniques and detection methods was both eye opening and informative. I plan on recommending this book to local universities as it is a great learning aid and a general wealth of knowledge. Anyone looking to learn about data hiding or steganography must have this book!
1 of 3 people found the following review helpful
5.0 out of 5 stars A Must Read! 6 Feb 2013
By Forensic Guru - Published on
Format:Kindle Edition
This book exceeded my expectations and was truly awakening. If you didn't believe steganography was a real life danger before reading this book, you will have a hard time sleeping after. Anyone looking for a thorough read on the threat of data hiding should read this book. I will highly recommend it to my peers.
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category