Analysis of high-tech methods of illegal remote computer data access
| Parent link: | Bulletin of the Tomsk Polytechnic University/ Tomsk Polytechnic University (TPU).— , 2006-2007 Vol. 310, № 1.— 2007.— [P. 194-197] |
|---|---|
| Κύριος συγγραφέας: | |
| Άλλοι συγγραφείς: | |
| Περίληψη: | Заглавие с титульного листа Электронная версия печатной публикации The analysis of high-tech methods of committing crimes in the sphere of computer information has been performed. The crimes were practically committed from remote computers. Virtual traces left at realisation of such methods are revealed. Specific proposals in investigation and prevention of the given type computer entry are developed. |
| Έκδοση: |
2007
|
| Σειρά: | Control, computer engineering and information |
| Θέματα: | |
| Διαθέσιμο Online: | http://www.lib.tpu.ru/fulltext/v/Bulletin_TPU/2007/v310eng/i1/48.pdf |
| Μορφή: | Ηλεκτρονική πηγή Κεφάλαιο βιβλίου |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=180954 |
| Φυσική περιγραφή: | 1 файл (120 Кб) |
|---|---|
| Περίληψη: | Заглавие с титульного листа Электронная версия печатной публикации The analysis of high-tech methods of committing crimes in the sphere of computer information has been performed. The crimes were practically committed from remote computers. Virtual traces left at realisation of such methods are revealed. Specific proposals in investigation and prevention of the given type computer entry are developed. |