29,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
15 °P sammeln
  • Broschiertes Buch

This book covers the topics under Cybercrime, Tools and Methods used, Injection, Attacks, Setting up a laboratory, Forensic Understanding, Legal Challenges and essentials of Cyber security. Cyber criminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.

Produktbeschreibung
This book covers the topics under Cybercrime, Tools and Methods used, Injection, Attacks, Setting up a laboratory, Forensic Understanding, Legal Challenges and essentials of Cyber security. Cyber criminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers.
Autorenporträt
Ms.Juliet Rozario Pursuing a P.hD Degree in Data mining and warehousing as Specialization. Distinction First Class Master¿s degree in Computer Applications in 2008. She is working as a Lecturer for 12 years. She is good at handling Open Source Platforms like R Programming.