You are here:
  • ››
  • ››
  • ››

Show simple item record

Field
Value
Schema
contributor.author
Staffordshire University
dc
contributor.author
Dan Brearley
dc
date.accessioned
2010-03-26T16:24:02Z
dc
date.available
2010-03-26T16:24:02Z
dc
identifier
http://Crusharv1.staffs.ac.uk/cgi-bin/hive/hive.cgi/dan_b_gain_access_via_net_attack.flv?HIVE_REF=hii%3A2814&HIVE_RET=ORG&HIVE_REQ=2001/dan_b_gain_access_via_net_attack.flv
dc
identifier.uri
http://dspace.jorum.ac.uk/xmlui/handle/10949/2439
dc
description
Application and operating system attacks (part 2) and gaining access via network based attacks. Video lecture from a series on Methods and Issues of e-Investigation delivered by Dan Brearley. Running time approximately 47 minutes.
dc
publisher
Staffordshire University
dc
relation
WEB_LINK
dc
relation.uri
http://Crusharv1.staffs.ac.uk/cgi-bin/hive/hive.cgi/dan_b_gain_access_via_net_attack.flv?HIVE_REF=hii%3A2814&HIVE_RET=ORG&HIVE_REQ=2001/dan_b_gain_access_via_net_attack.flv
dc
rights
Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales
dc
rights.uri
http://creativecommons.org/licenses/by-nc-sa/2.0/uk/
dc
subject
cloning
dc
subject
ukoer
dc
subject
computer security
dc
subject
session tracking
dc
subject
cookies
dc
title
Gaining access via net attacks
dc
audience
HE
dc
subject.jacs3
Computer science
dc
subject.jacs3code
I100
dc
oer
true
jmd
resourceclass
WEB_LINK
jmd
community
Higher Education
jmd


Files in this item

Files Size Format View

There are no files associated with this item.

 

Show simple item record

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Except where otherwise noted, this item's license is described as Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales

My Account

Statistics