Surveillance and the Art of Digital Camouflage, Second Edition
At the beginning of each chapter, the text defines and explains the respective milestone. Then the chapter introduces some free, open-source tools that the reader will use to reach the milestone. The third section of each chapter is a practical part. It presents numerous exercises to put the tools to work and practice stealth communication. Each of those exercises begins with an introduction listing the difficulty, the estimated working time, and prerequisites if needed.
When reading the chapters' exercise sections, you should have a running computer at your side, your gaze switching between the computer screen and book pages, and your fingers on the keyboard. The author will encourage readers to double-check assertions from the book against the results of own Internet inquests, to reproduce findings with their system, to install and use free, open-source software for digital defense, and to practice secure modes of communication. In the finalizing section of the chapters, the author describes attackers' options against the techniques practiced before and means to defend against those attacks.