EUR 5,38
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: As New. Like New condition. A near perfect copy that may have very minor cosmetic defects.
Da: SecondSale, Montgomery, IL, U.S.A.
EUR 7,28
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: ZBK Books, Carlstadt, NJ, U.S.A.
EUR 7,30
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: good. Fast & Free Shipping â" Good condition with a solid cover and clean pages. Shows normal signs of use such as light wear or a few marks highlighting, but overall a well-maintained copy ready to enjoy. Supplemental items like CDs or access codes may not be included.
Editore: Elsevier Science & Technology Books, 2012
ISBN 10: 1597497436 ISBN 13: 9781597497435
Lingua: Inglese
Da: Better World Books, Mishawaka, IN, U.S.A.
EUR 7,41
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Used book that is in clean, average condition without any missing pages.
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
EUR 4,21
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Editore: Elsevier Science & Technology Books, 2012
ISBN 10: 1597497436 ISBN 13: 9781597497435
Lingua: Inglese
Da: TextbookRush, Grandview Heights, OH, U.S.A.
EUR 10,86
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Ships SAME or NEXT business day. We Ship to APO/FPO addr. Choose EXPEDITED shipping and receive in 2-5 business days within the United States. See our member profile for customer support contact info. We have an easy return policy.
EUR 29,16
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
EUR 32,25
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 52,72
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Syngress Publishing 11/9/2012, 2012
ISBN 10: 1597497436 ISBN 13: 9781597497435
Lingua: Inglese
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
EUR 56,37
Convertire valutaQuantità: 5 disponibili
Aggiungi al carrelloPaperback or Softback. Condizione: New. Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols 1.15. Book.
Da: Best Price, Torrance, CA, U.S.A.
EUR 48,71
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. SUPER FAST SHIPPING.
EUR 49,67
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 268 3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam.
Da: Chiron Media, Wallingford, Regno Unito
EUR 41,03
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
EUR 57,91
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 268.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 52,01
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 575.
EUR 58,79
Convertire valutaQuantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 268.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,05
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Revaluation Books, Exeter, Regno Unito
EUR 45,98
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 350 pages. 9.25x7.50x0.50 inches. In Stock.
EUR 42,55
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. KlappentextrnrnCurrent attack vectors indicate that malware, spyware, and other nefarious attacks are targeting mobile devices for financial gain, cyber espionage, or to simply damage company reputation. Additionally, the threat from the inside .
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 43,16
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 42,02
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 37,96
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 211.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 43,74
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: new. Questo è un articolo print on demand.
Editore: Syngress Media, Syngress Okt 2014, 2014
ISBN 10: 1597497436 ISBN 13: 9781597497435
Lingua: Inglese
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 48,70
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 Dives deep into the less known approaches to data hiding, covert communications, and advanced malware Includes never before published information about next generation methods of data hiding Outlines a well-defined methodology for countering threats Looks ahead at future predictions for data hiding 350 pp. Englisch.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 67,22
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 575.
Da: moluna, Greven, Germania
EUR 49,09
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies .
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 54,46
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.