Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/9475
Full metadata record
DC FieldValueLanguage
dc.contributor.authorD. Evangeline-
dc.date.accessioned2024-02-27T07:12:41Z-
dc.date.available2024-02-27T07:12:41Z-
dc.date.issued2020-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/9475-
dc.description.abstractEveryone has heard of an old adage 'One man's garbage is another man's treasure." It is relevant even in today's world. Hackers try to extract useful information from the network using much number of ways. Dumpster Diving is one such attack that has been playing such a role for quiet sometime [1 ]. Usually, hackers try to find useful information from the garbage. In case the hacker gets a user's credentials, impersonation is done. Hence, any kind of information, even when disposed must be done in well-calculated manner such that the wrong people do not gain access to the same [2].-
dc.publisherCSI Communications-
dc.titleElectronic Dumpster Diving-
dc.volVol 43-
dc.issuedNo 12-
Appears in Collections:Articles to be qced

Files in This Item:
File SizeFormat 
Electronic Dumpster Diving- D Evangeline.pdf
  Restricted Access
350.53 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.