由买买提看人间百态

boards

本页内容为未名空间相应帖子的节选和存档,一周内的贴子最多显示50字,超过一周显示500字 访问原贴
Security版 - Investigator's Guide to Steganography
相关主题
Network Security HacksSecuring IIS 6.0
CYA: Securing Exchange Server 2003 ...Computer Forensics resources
Snort 2.1 Intrusion Detection, Second Edition至少truecrypt还是比较安全的吧 (转载)
Network Security AssessmentStealing the Network: How to Own a Continent
Securing Wireless LAN'sEGGHEAD.COM被黑了!
Stealing the Network: How to Own the Box欢迎投稿International Journal of Image and Graphics专刊
Know Your Enemy: A Forensics Analysis[转载] BSD Sockets Programming ...
Biometrics and Network SecurityFoundations of Soft Case-Based Reasoning
相关话题的讨论汇总
话题: guide话题: its
进入Security版参与讨论
1 (共1页)
os
发帖数: 81
1
Posted from Open Collections Program@LISF
Download Address: http://www.lanken.com/forum/viewtopic.php?t=84
Investigator's Guide to Steganography.
by Gregory Kipper.
ISBN: 0-8493-2433-5, Auerbach Publications, October 2003.
240 Pages, Paperback.
Guide provides a comprehensive look at steno-graphy,
a unique form of hidden communication from its earliest
beginnings to its most modern uses. For computer forensics
investigators and IT security consultants.
Investigators within the law enforce
1 (共1页)
进入Security版参与讨论
相关主题
Foundations of Soft Case-Based ReasoningSecuring Wireless LAN's
请教版上大牛:Forensic Accounting怎么样啊?Stealing the Network: How to Own the Box
Atlanta的范子体非正常死亡是否是由乙二醇中毒所致Know Your Enemy: A Forensics Analysis
ZL宿舍失窃是破案的最佳突破口:forensic scienceBiometrics and Network Security
Network Security HacksSecuring IIS 6.0
CYA: Securing Exchange Server 2003 ...Computer Forensics resources
Snort 2.1 Intrusion Detection, Second Edition至少truecrypt还是比较安全的吧 (转载)
Network Security AssessmentStealing the Network: How to Own a Continent
相关话题的讨论汇总
话题: guide话题: its