Sila gunakan pengecam ini untuk memetik atau memaut ke item ini: https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666
Tajuk: Computer forensics Investigating Data and Image Files
Kata kunci: Digital forensics—Image files—Analysis
Computer crimes—Investigation—Handbooks, manuals, etc.
Data recovery (Computer science)—Textbooks
Evidence (Law)—Data processing—Study guides
Tarikh diterbit: 2010
Penerbit: Cengage Learning
Siri / Laporan No.: Volume 3 of 5 mapping to C H F I Computer Hacking Forensic INVESTIGATOR;
Abstrak: Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus software. Hackers have proven their dedication and ability to systematically penetrate networks all over the world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system, steal everything of value, and completely erase their tracks in less than 20 minutes!
URI: https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666
ISBN: 978-1-4354-8351-4
Muncul dalam Koleksi:BUKU RUJUKAN JABATAN KEJURUTERAAN AWAM



Item di DSpace dilindungi oleh hak cipta, dengan semua hak dilindungi, kecuali dinyatakan sebaliknya.