Please use this identifier to cite or link to this item: https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666
Title: Computer forensics Investigating Data and Image Files
Keywords: Digital forensics—Image files—Analysis
Computer crimes—Investigation—Handbooks, manuals, etc.
Data recovery (Computer science)—Textbooks
Evidence (Law)—Data processing—Study guides
Issue Date: 2010
Publisher: Cengage Learning
Series/Report no.: Volume 3 of 5 mapping to C H F I Computer Hacking Forensic INVESTIGATOR;
Abstract: Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus software. Hackers have proven their dedication and ability to systematically penetrate networks all over the world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system, steal everything of value, and completely erase their tracks in less than 20 minutes!
URI: https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666
ISBN: 978-1-4354-8351-4
Appears in Collections:BUKU RUJUKAN JABATAN KEJURUTERAAN AWAM

Files in This Item:
File Description SizeFormat 
Computer Forensics Investigating Data and Image Files by EC-Council (z-lib.org).pdf15.59 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.