In this section, the literature survey on the steganography and various network security mechanisms are identified. Many existing algorithms for steganography since 1991 to 2009 are studied and shown in this literature survey. Amounts of web sites as well as research papers are known on virtualization, ARP Spoofing, IDS Architectures. The explanation of the research papers referred regarding steganography and network security receive in the subsequent sections. The books is provided in chronological order for both of these areas independently.
2. 2 Books survey on steganography
Bender et al.  in this paper, the authors identify the techniques of data covering like low little bit rate data hiding in detail.
Johnson, N. and Jajodia S.
The Pythagorean Theorem calculator is a special calculator that calculates the length of a hypotenuse or an unknown leg of a right triangle. The hypotenuse in the right triangle is the side that is opposite to the right angle. This side can be found using the hypotenuse formula, which is one more term for the Pythagorean Theorem used for solving the hypotenuse. As you remember the right triangle is a triangle with an angle that measure 90 degrees. The sum of the other two angles in the right triangle must also total 90 degrees, because the sum of the measures of all the angles in any triangle must be equal to 180 degrees. Below let’s learn more about the hypotenuse, the Pythagorean Theorem, and Pythagoras himself.
Pythagoras’s teachers were Germodamant and Pherecydes. Later, Pythagoras went to Miletus, where he met with other scientist – Thales.