Please use this identifier to cite or link to this item: https://repositori.mypolycc.edu.my/jspui/handle/123456789/4666
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2025-07-16T01:50:07Z-
dc.date.available2025-07-16T01:50:07Z-
dc.date.issued2010-
dc.identifier.isbn978-1-4354-8351-4-
dc.identifier.urihttps://repositori.mypolycc.edu.my/jspui/handle/123456789/4666-
dc.description.abstractHacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus software. Hackers have proven their dedication and ability to systematically penetrate networks all over the world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system, steal everything of value, and completely erase their tracks in less than 20 minutes!ms_IN
dc.language.isoenms_IN
dc.publisherCengage Learningms_IN
dc.relation.ispartofseriesVolume 3 of 5 mapping to C H F I Computer Hacking Forensic INVESTIGATOR;-
dc.subjectDigital forensics—Image files—Analysisms_IN
dc.subjectComputer crimes—Investigation—Handbooks, manuals, etc.ms_IN
dc.subjectData recovery (Computer science)—Textbooksms_IN
dc.subjectEvidence (Law)—Data processing—Study guidesms_IN
dc.titleComputer forensics Investigating Data and Image Filesms_IN
dc.typeBookms_IN
Appears in Collections:BUKU RUJUKAN JABATAN KEJURUTERAAN AWAM

Files in This Item:
File Description SizeFormat 
Computer Forensics Investigating Data and Image Files by EC-Council (z-lib.org).pdf15.59 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.