Analysis of high-tech methods of illegal remote computer data access; Bulletin of the Tomsk Polytechnic University; Vol. 310, № 1

Bibliographische Detailangaben
Parent link:Bulletin of the Tomsk Polytechnic University/ Tomsk Polytechnic University (TPU).— , 2006-2007
Vol. 310, № 1.— 2007.— [P. 194-197]
1. Verfasser: Polyakov V. V.
Weitere Verfasser: Slobodyan S. M. Stepan Mikhaylovich
Zusammenfassung:Заглавие с титульного листа
Электронная версия печатной публикации
The analysis of high-tech methods of committing crimes in the sphere of computer information has been performed. The crimes were practically committed from remote computers. Virtual traces left at realisation of such methods are revealed. Specific proposals in investigation and prevention of the given type computer entry are developed.
Sprache:Englisch
Veröffentlicht: 2007
Schriftenreihe:Control, computer engineering and information
Schlagworte:
Online-Zugang:http://www.lib.tpu.ru/fulltext/v/Bulletin_TPU/2007/v310eng/i1/48.pdf
Format: Elektronisch Buchkapitel
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=180954

MARC

LEADER 00000nla2a2200000 4500
001 180954
005 20231031170926.0
035 |a (RuTPU)RU\TPU\book\196162 
035 |a RU\TPU\book\196160 
090 |a 180954 
100 |a 20100531d2007 k y0rusy50 ca 
101 1 |a eng  |c rus 
102 |a RU 
135 |a drnn ---uucaa 
200 1 |a Analysis of high-tech methods of illegal remote computer data access  |b Electronic resource  |f V. V. Polyakov, S. М. Slobodyan 
203 |a Text  |c electronic 
215 |a 1 файл (120 Кб) 
225 1 |a Control, computer engineering and information 
230 |a Электронные текстовые данные (1 файл : 120 Кб) 
300 |a Заглавие с титульного листа 
300 |a Электронная версия печатной публикации 
320 |a [Bibliography: p. 197 (11 titles)] 
330 |a The analysis of high-tech methods of committing crimes in the sphere of computer information has been performed. The crimes were practically committed from remote computers. Virtual traces left at realisation of such methods are revealed. Specific proposals in investigation and prevention of the given type computer entry are developed. 
337 |a Adobe Reader 
461 1 |0 (RuTPU)RU\TPU\book\169973  |t Bulletin of the Tomsk Polytechnic University  |f Tomsk Polytechnic University (TPU)  |d 2006-2007 
463 1 |0 (RuTPU)RU\TPU\book\195457  |t Vol. 310, № 1  |v [P. 194-197]  |d 2007  |p 201 p. 
610 1 |a analysis 
610 1 |a high-tech methods 
610 1 |a remote access 
610 1 |a computer data 
610 1 |a crimes 
610 1 |a virtual traces 
610 1 |a proposals 
610 1 |a investigations 
610 1 |a preventions 
610 1 |a электронный ресурс 
675 |a 343.9  |v 3 
700 1 |a Polyakov  |b V. V. 
701 1 |a Slobodyan  |b S. M.  |c Specialist in the field of electric power engineering  |c Professor of Tomsk Polytechnic University, Doctor of technical sciences  |f 1946-  |g Stepan Mikhaylovich  |2 stltpush  |3 (RuTPU)RU\TPU\pers\35552 
801 1 |a RU  |b 63413507  |c 20090623  |g PSBO 
801 2 |a RU  |b 63413507  |c 20190515  |g PSBO 
856 4 |u http://www.lib.tpu.ru/fulltext/v/Bulletin_TPU/2007/v310eng/i1/48.pdf 
942 |c CF