• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Information hiding in communication networks :

پدید آورنده
Wojciech Mazurczyk...[et al.].

موضوع
Computer networks-- Security measures.,Data protection.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1119081718
(Number (ISBN
9781119081715
Erroneous ISBN
1119081831
Erroneous ISBN
9781119081838

NATIONAL BIBLIOGRAPHY NUMBER

Number
dltt

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Information hiding in communication networks :
General Material Designation
[Book]
Other Title Information
fundamentals, mechanisms, applications, and countermeasures /
First Statement of Responsibility
Wojciech Mazurczyk...[et al.].

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (325 pages).

SERIES

Series Title
IEEE Press Series on Information and Communication Networks Security

GENERAL NOTES

Text of Note
Description based upon print version of record

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols

CONTENTS NOTE

Text of Note
Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Text of Note
3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary
Text of Note
7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement
Text of Note
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications
0
8
8
8

OTHER EDITION IN ANOTHER MEDIUM

Title
Information Hiding in Communication Networks : Fundamentals, Mechanisms, Applications, and Countermeasures
International Standard Book Number
9781119081715

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Data protection.

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Houmansadr, Amir.
Mazurczyk, Wojciech.
Szczypiorski, Krzysztof,1949-
Wendzel, Steffen.
Zander, Sebastian.

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

Ohio Library and Information Network.

ORIGINATING SOURCE

Date of Transaction
20160523104205.0
Cataloguing Rules (Descriptive Conventions))
rda

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival