Artículos relacionados a Disappearing Cryptography: Information Hiding: Steganography...

Disappearing Cryptography: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming) - Tapa blanda

 
9780123744791: Disappearing Cryptography: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)

Sinopsis

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca del autor

Peter Wayner is a writer living in Baltimore and is the author of Digital Cash and Agents at Large (both Academic Press). His writings appear in numerous academic journals as well as the pages of more popular forums such as MacWorld and the New York Times. He has taught various computer science courses at Cornell University and Georgetown University.

De la contraportada

In a time of electronic espionage, this new edition of our best-selling title ensures the security and confidentiality of your electronic content, communication and commerce!

Disappearing Cryptography, Third Edition delves deep into steganography by delineating a number of different methods to hide and therefore protect information in all types of digital media files. During the last five years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this new edition amends and expands on outdated sections by focusing on new dangers, and includes five completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the most evolved forms of attack.

Each chapter provides an introduction and a high-level summary enabling the reader to understand the concepts without wading through technical explanations, and presents detailed, concrete examples for those who want to implement the algorithms or write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also to consider future developments in their designs, thus fulfilling the need for preemptive caution that is becoming even more explicit as the transference of digital media escalates.

  • Includes five new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
  • Conceptual tutelage in conjunction with detailed mathematical directives allows readers to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
|

In a time of electronic espionage, this new edition of our best-selling title ensures the security and confidentiality of your electronic content, communication and commerce!

Disappearing Cryptography, Third Edition delves deep into steganography by delineating a number of different methods to hide and therefore protect information in all types of digital media files. During the last five years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this new edition amends and expands on outdated sections by focusing on new dangers, and includes five completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the most evolved forms of attack.

Each chapter provides an introduction and a high-level summary enabling the reader to understand the concepts without wading through technical explanations, and presents detailed, concrete examples for those who want to implement the algorithms or write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also to consider future developments in their designs, thus fulfilling the need for preemptive caution that is becoming even more explicit as the transference of digital media escalates.

  • Includes five new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
  • Conceptual tutelage in conjunction with detailed mathematical directives allows readers to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
  • Access to online source code for implementing proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.

"Sobre este título" puede pertenecer a otra edición de este libro.

  • EditorialMorgan Kaufmann Publishers In
  • Año de publicación2008
  • ISBN 10 0123744792
  • ISBN 13 9780123744791
  • EncuadernaciónTapa blanda
  • IdiomaInglés
  • Número de edición3
  • Número de páginas456
  • Contacto del fabricanteno disponible

Comprar usado

Condición: Regular
This is an ex-library book and...
Ver este artículo

EUR 10,58 gastos de envío desde Reino Unido a España

Destinos, gastos y plazos de envío

Comprar nuevo

Ver este artículo

EUR 17,51 gastos de envío desde Reino Unido a España

Destinos, gastos y plazos de envío

Resultados de la búsqueda para Disappearing Cryptography: Information Hiding: Steganography...

Imagen de archivo

Wayner, P.
Publicado por Elsevier/Morgan Kaufmann, 2009
ISBN 10: 0123744792 ISBN 13: 9780123744791
Antiguo o usado Tapa blanda

Librería: Anybook.com, Lincoln, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: Fair. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. With owner's name inside cover. In fair condition, suitable as a study copy. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,850grams, ISBN:9780123744791. Nº de ref. del artículo: 9421261

Contactar al vendedor

Comprar usado

EUR 24,07
Convertir moneda
Gastos de envío: EUR 10,58
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Wayner, P.
Publicado por Morgan Kaufmann, 2009
ISBN 10: 0123744792 ISBN 13: 9780123744791
Antiguo o usado Tapa blanda

Librería: Anybook.com, Lincoln, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. Clean from markings In good all round condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,900grams, ISBN:9780123744791. Nº de ref. del artículo: 9398050

Contactar al vendedor

Comprar usado

EUR 30,91
Convertir moneda
Gastos de envío: EUR 10,58
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Peter Wayner
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Paperback

Librería: Chiron Media, Wallingford, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: New. Nº de ref. del artículo: 6666-ELS-9780123744791

Contactar al vendedor

Comprar nuevo

EUR 53,34
Convertir moneda
Gastos de envío: EUR 17,51
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen de archivo

Wayner, Peter
Publicado por Morgan Kaufmann Pub, 2008
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Paperback

Librería: Revaluation Books, Exeter, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Brand New. 3rd edition. 439 pages. 9.00x7.20x0.50 inches. In Stock. Nº de ref. del artículo: __0123744792

Contactar al vendedor

Comprar nuevo

EUR 60,40
Convertir moneda
Gastos de envío: EUR 11,68
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Wayner Peter
Publicado por Elsevier, 2008
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Tapa blanda

Librería: Majestic Books, Hounslow, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. pp. xv + 439 Illus. Nº de ref. del artículo: 8344336

Contactar al vendedor

Comprar nuevo

EUR 63,80
Convertir moneda
Gastos de envío: EUR 10,34
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen de archivo

Peter Wayner
Publicado por Elsevier Science & Technology, 2008
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Paperback / softback

Librería: THE SAINT BOOKSTORE, Southport, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 801. Nº de ref. del artículo: B9780123744791

Contactar al vendedor

Comprar nuevo

EUR 66,29
Convertir moneda
Gastos de envío: EUR 10,07
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen del vendedor

Peter Wayner
Publicado por Elsevier Science Dez 2008, 2008
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Taschenbuch
Impresión bajo demanda

Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates. Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design 456 pp. Englisch. Nº de ref. del artículo: 9780123744791

Contactar al vendedor

Comprar nuevo

EUR 66,80
Convertir moneda
Gastos de envío: EUR 11,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Peter Wayner
Publicado por Elsevier Science, 2008
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Taschenbuch
Impresión bajo demanda

Librería: AHA-BUCH GmbH, Einbeck, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates. Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design. Nº de ref. del artículo: 9780123744791

Contactar al vendedor

Comprar nuevo

EUR 71,74
Convertir moneda
Gastos de envío: EUR 11,99
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Wayner, Peter
Publicado por Academic Press, 2009
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Tapa blanda
Impresión bajo demanda

Librería: moluna, Greven, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. This book on cryptography and information hiding delineates a number of different methods to hide information in various types of digital. Nº de ref. del artículo: 594357175

Contactar al vendedor

Comprar nuevo

EUR 64,28
Convertir moneda
Gastos de envío: EUR 19,49
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen de archivo

Peter Wayner
Publicado por Elsevier, 2008
ISBN 10: 0123744792 ISBN 13: 9780123744791
Nuevo Tapa blanda

Librería: Books Puddle, New York, NY, Estados Unidos de America

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. pp. xv + 439 3rd Edition. Nº de ref. del artículo: 26584911

Contactar al vendedor

Comprar nuevo

EUR 76,98
Convertir moneda
Gastos de envío: EUR 10,00
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Existen otras 4 copia(s) de este libro

Ver todos los resultados de su búsqueda