High-tech Crimes Revealed: Cyberwar Stories from the Digital Front
Helps to educate people on the issues with high-tech crimes. This book demystifies the risks and realities of high-tech crimes. It looks at how digital crimes are discovered, what techniques the criminals use and why, and how they can be brought to justice. It provides an account of what is involved in investigating computer crime.
17 pages matching backdoor in this book
Results 1-3 of 17
What people are saying - Write a review
We haven't found any reviews in the usual places.
chapteri An Attack on the Telephone Network
chapter2 An Attack on an ISP
18 other sections not shown
able allow arrest backdoor bank Basically bulletin board Celco cell phone cellular certainly collected computer log files computer systems cops copy corporate network credit card fraud credit card numbers criminal damage disk drives downloaded easy electronic email message employees evidence Figure Fireﬂy firewall forensic FreeBSD hacker attacks hacking hacking tools high technology high-tech crimes High-Tech Crimes Revealed Hot-ice identify identity theft Internet investigation IP address issues law enforcement Loan Fraud log files look Mike modem monitor motivated network security operating system options PayPal person personal computers phone number phone service police potential problem reported rootkit Roz’s search warrant server sniffer someone steal suspect system administrator target techniques telephone network telephone number things tion U.S. Secret Service UNIX userid users usually victim virus vulnerable wanted wardialing Wesley Wily