Please use this identifier to cite or link to this item:
https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666
Title: | Computer forensics Investigating Data and Image Files |
Keywords: | Digital forensics—Image files—Analysis Computer crimes—Investigation—Handbooks, manuals, etc. Data recovery (Computer science)—Textbooks Evidence (Law)—Data processing—Study guides |
Issue Date: | 2010 |
Publisher: | Cengage Learning |
Series/Report no.: | Volume 3 of 5 mapping to C H F I Computer Hacking Forensic INVESTIGATOR; |
Abstract: | Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus software. Hackers have proven their dedication and ability to systematically penetrate networks all over the world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system, steal everything of value, and completely erase their tracks in less than 20 minutes! |
URI: | https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666 |
ISBN: | 978-1-4354-8351-4 |
Appears in Collections: | BUKU RUJUKAN JABATAN KEJURUTERAAN AWAM |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Computer Forensics Investigating Data and Image Files by EC-Council (z-lib.org).pdf | 15.59 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.