February 2026
Intermediate to advanced
456 pages
17h 3m
English
© PeachShutterStock/Shutterstock
TECHNICALLY SAVVY CRIMINALS try to hide evidence on their computers. There are any number of techniques one can use to either hide or protect information. These techniques are usually referred to as anti-forensics. By using these techniques, even if the computer is seized and searched, investigators are less likely to find the evidence. This chapter introduces two common methods of hiding and scrambling information: steganography and cryptography. These techniques predate modern computers. In fact, they are so old that they can trace ...
Read now
Unlock full access