Analysis of high-tech methods of illegal remote computer data access; Bulletin of the Tomsk Polytechnic University; Vol. 310, № 1
| Parent link: | Bulletin of the Tomsk Polytechnic University/ Tomsk Polytechnic University (TPU).— , 2006-2007 Vol. 310, № 1.— 2007.— [P. 194-197] |
|---|---|
| 1. Verfasser: | |
| Weitere Verfasser: | |
| Zusammenfassung: | Заглавие с титульного листа Электронная версия печатной публикации The analysis of high-tech methods of committing crimes in the sphere of computer information has been performed. The crimes were practically committed from remote computers. Virtual traces left at realisation of such methods are revealed. Specific proposals in investigation and prevention of the given type computer entry are developed. |
| Sprache: | Englisch |
| Veröffentlicht: |
2007
|
| Schriftenreihe: | Control, computer engineering and information |
| Schlagworte: | |
| Online-Zugang: | http://www.lib.tpu.ru/fulltext/v/Bulletin_TPU/2007/v310eng/i1/48.pdf |
| Format: | Elektronisch Buchkapitel |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=180954 |
MARC
| LEADER | 00000nla2a2200000 4500 | ||
|---|---|---|---|
| 001 | 180954 | ||
| 005 | 20231031170926.0 | ||
| 035 | |a (RuTPU)RU\TPU\book\196162 | ||
| 035 | |a RU\TPU\book\196160 | ||
| 090 | |a 180954 | ||
| 100 | |a 20100531d2007 k y0rusy50 ca | ||
| 101 | 1 | |a eng |c rus | |
| 102 | |a RU | ||
| 135 | |a drnn ---uucaa | ||
| 200 | 1 | |a Analysis of high-tech methods of illegal remote computer data access |b Electronic resource |f V. V. Polyakov, S. М. Slobodyan | |
| 203 | |a Text |c electronic | ||
| 215 | |a 1 файл (120 Кб) | ||
| 225 | 1 | |a Control, computer engineering and information | |
| 230 | |a Электронные текстовые данные (1 файл : 120 Кб) | ||
| 300 | |a Заглавие с титульного листа | ||
| 300 | |a Электронная версия печатной публикации | ||
| 320 | |a [Bibliography: p. 197 (11 titles)] | ||
| 330 | |a The analysis of high-tech methods of committing crimes in the sphere of computer information has been performed. The crimes were practically committed from remote computers. Virtual traces left at realisation of such methods are revealed. Specific proposals in investigation and prevention of the given type computer entry are developed. | ||
| 337 | |a Adobe Reader | ||
| 461 | 1 | |0 (RuTPU)RU\TPU\book\169973 |t Bulletin of the Tomsk Polytechnic University |f Tomsk Polytechnic University (TPU) |d 2006-2007 | |
| 463 | 1 | |0 (RuTPU)RU\TPU\book\195457 |t Vol. 310, № 1 |v [P. 194-197] |d 2007 |p 201 p. | |
| 610 | 1 | |a analysis | |
| 610 | 1 | |a high-tech methods | |
| 610 | 1 | |a remote access | |
| 610 | 1 | |a computer data | |
| 610 | 1 | |a crimes | |
| 610 | 1 | |a virtual traces | |
| 610 | 1 | |a proposals | |
| 610 | 1 | |a investigations | |
| 610 | 1 | |a preventions | |
| 610 | 1 | |a электронный ресурс | |
| 675 | |a 343.9 |v 3 | ||
| 700 | 1 | |a Polyakov |b V. V. | |
| 701 | 1 | |a Slobodyan |b S. M. |c Specialist in the field of electric power engineering |c Professor of Tomsk Polytechnic University, Doctor of technical sciences |f 1946- |g Stepan Mikhaylovich |2 stltpush |3 (RuTPU)RU\TPU\pers\35552 | |
| 801 | 1 | |a RU |b 63413507 |c 20090623 |g PSBO | |
| 801 | 2 | |a RU |b 63413507 |c 20190515 |g PSBO | |
| 856 | 4 | |u http://www.lib.tpu.ru/fulltext/v/Bulletin_TPU/2007/v310eng/i1/48.pdf | |
| 942 | |c CF | ||