Access "Secure Reads: Multimedia Fingerprinting Forensics for Traitor Tracing"
This article is part of the December 2006 issue of What's your biggest information security concern?
Here are three security titles for your bookshelf. This month, we highlight forensics: Multimedia Fingerprinting Forensics for Traitor Tracing By K.J. Ray Liu, Wade Trappe, Z. Jane Wang, Min Wu, Hong Zhao Hindawi Publishing Corp., 255 pages, $119.95 The authors, whose specialties lie in electrical engineering, DRM and computer science, include discussions on digital watermarking and fingerprinting, the analysis of multiuser collusion attacks, and the performance and design of fingerprints. File System Forensic Analysis By Brian Carrier Addison-Wesley Pearson Education, 569 pages, $69.99 www.digital-evidence.com The author shares his experience writing forensics tools with the literary world, discussing topics such as preserving the digital crime scene, identifying hidden data, analyzing partitions, and collecting the evidence needed to convict digital criminals. A Guide to Forensic Testimony By Fred Chris Smith, Rebecca Gurley Bace Addison-Wesley Pearson Education, 509 pages, $54.99 Though published in 2003, this bookshelf mainstay offers firsthand accounts ... Access >>>
Premium Content for Free.
Finding the best security testing tools for product evaluation
Learn how you can use new information security tools to examine security products and investments, such as IPS, firewall or VPN gateway.
Risk Management: Skybox Security's Skybox View 3.0
Read a security product review of Skybox Security's Skybox View 3.0.
Third Brigade's Deep Security 4.5
Intrusion Detection: Lancope StealthWatch 5.5
Lancope's Lancope StealthWatch 5.5
Protect What's Precious
We asked and you answered: Insiders, information leaks, compliance and the bottom line are your front-and-center priorities for 2007.
- At Your Service: December 2006 managed services security news
Reconnex's iGuard v5 security tool review
by Tom Bowers, Contributor
Product review of Reconnex iGuard v5, a data protection security tool used for information leaks, compliance, perimeter security, traffic analysis and tracking.
- Finding the best security testing tools for product evaluation
Security Products Latest Version Releases: CipherTrust, Infoblox
Get news on the latest version product releases; get setup, pricing and configuration info from vendors such as CipherTrust, Infoblox and Safend.
Secure Reads: Multimedia Fingerprinting Forensics for Traitor Tracing
Read a quick review of Multimedia Fingerprinting Forensics for Traitor Tracing.
Automated data classification drives security, storage convergence
Data classification products from a variety of startups are leading efforts to increase convergence of security, compliance and storage management.
Antimalware: Prevx's Prevx1
Avoiding Audit Failure: Getting Advice on PCI Compliance Mistakes
Get advice from auditors on how to avoid audit failure and get PCI DSS compliant to prevent a security breach.
- Security 7, 'Best In Show' Shine
- Security Products Latest Version Releases: CipherTrust, Infoblox
Editor's Desk: More threats and more dollars
Holiday Cheer or Fear?
PING: Bernard Donnelly
Read an interview with Bernard Donnelly, vice president of quality assurance for the Philadelphia Stock Exchange.
Perspectives: Lack of enforcement undercuts HIPAA
A lack of HIPAA enforcement makes physicians unwilling to change habits that threaten the security of data.
Layer 8: Security managers come into their own
- Editor's Desk: More threats and more dollars
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...