search for books and compare prices
Neil F. Johnson has written 5 work(s)
Search for other authors with the same name
displaying 1 to 5 | at end
show results in order: alphabetically | oldest to newest | newest to oldest
Cover for 9780792372042 Cover for 9781461369677 Cover for 9780306440915 Cover for 9781468413656 Cover for 9781851686308 Cover for 9780198526650 Cover for 9780735712324
cover image for 9781461369677
Product Description: Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking)...read more

Hardcover:

9780792372042 | Kluwer Academic Pub, February 1, 2001, cover price $169.00

Paperback:

9781461369677 | Reprint edition (Springer-Verlag New York Inc, October 5, 2012), cover price $139.00 | About this edition: Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding.

cover image for 9781468413656
By Robert C. Brown (editor), John A. Hoskins (editor) and Neil F. Johnson (editor)

Hardcover:

9780306440915 | Plenum Pub Corp, February 1, 1992, cover price $99.00

Paperback:

9781468413656 | Reprint edition (Springer Verlag, February 22, 2012), cover price $99.00

cover image for 9781851686308

Paperback:

9781851686308 | Reprint edition (Oneworld Pubns Ltd, March 1, 2010), cover price $15.95

cover image for 9780735712324
Examines how various security methods are used and how they work, covering options including packet filtering, proxy firewalls, network intrusion detection, virtual private networks, and encryption. (view table of contents)

Paperback:

9780735712324 | 1 edition (Sams, June 28, 2002), cover price $49.99 | About this edition: Examines how various security methods are used and how they work, covering options including packet filtering, proxy firewalls, network intrusion detection, virtual private networks, and encryption.

displaying 1 to 5 | at end