19 pages matching high technology in this book
Results 1-3 of 19
What people are saying - Write a review
We haven't found any reviews in the usual places.
chapteri An Attack on the Telephone Network
chapter2 An Attack on an ISP
18 other sections not shown
able allow arrest backdoor bank Basically bulletin board Celco cell phone cellular certainly collected computer log files computer systems cops copy corporate network credit card fraud credit card numbers criminal damage disk drives downloaded easy electronic email message employees evidence Figure Fireﬂy firewall forensic FreeBSD hacker attacks hacking hacking tools high technology high-tech crimes High-Tech Crimes Revealed Hot-ice identify identity theft Internet investigation IP address issues law enforcement Loan Fraud log files look Mike modem monitor motivated network security operating system options PayPal person personal computers phone number phone service police potential problem reported rootkit Rozís search warrant server sniffer someone steal suspect system administrator target techniques telephone network telephone number things tion U.S. Secret Service UNIX userid users usually victim virus vulnerable wanted wardialing Wesley Wily