Check nearby libraries
Buy this book

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be observed immediately the apparent lack of box jewelry, penetration of an accounting server can be detected after a few months when all clients have given up the company services because of the stolen data came to competition and have helped it to make best deals.
Cybercrime is a phenomenon of our time, often reflected in the media. Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. The computer itself is the main source of information for the investigator.
Check nearby libraries
Buy this book

Subjects
guide, cybercrime, investigators, computer, data, attacks, forensic investigationEdition | Availability |
---|---|
1 |
aaaa
|
Book Details
Edition Identifiers
Work Identifiers
Links outside Open Library
Community Reviews (0)
January 9, 2024 | Edited by Nicolae Sfetcu | Edited without comment. |
January 9, 2024 | Created by Nicolae Sfetcu | Added new book. |