NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
Kuala Lumpur : Universiti Teknologi Malaysia ,
2016
|
Subjects: |
_version_ | 1796756228189192192 |
---|---|
author | Ahmad Shukri Samsuddin, 1982-, author Azizah Abdul Manaf, Prof.Dr., supervisor Sekolah Informatiks Termaju |
author_facet | Ahmad Shukri Samsuddin, 1982-, author Azizah Abdul Manaf, Prof.Dr., supervisor Sekolah Informatiks Termaju |
author_sort | Ahmad Shukri Samsuddin, 1982-, author |
collection | OCEAN |
description | Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015 |
first_indexed | 2024-03-05T15:13:49Z |
format | |
id | KOHA-OAI-TEST:534268 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T15:13:49Z |
publishDate | 2016 |
publisher | Kuala Lumpur : Universiti Teknologi Malaysia , |
record_format | dspace |
spelling | KOHA-OAI-TEST:5342682020-12-19T17:20:08ZNETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / Ahmad Shukri Samsuddin, 1982-, author Azizah Abdul Manaf, Prof.Dr., supervisor Sekolah Informatiks Termaju Kuala Lumpur : Universiti Teknologi Malaysia ,2016engThesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015Includes bibliographical referencesPSZKLLComputer crimesComputer networksData encryption (Computer science) |
spellingShingle | Computer crimes Computer networks Data encryption (Computer science) Ahmad Shukri Samsuddin, 1982-, author Azizah Abdul Manaf, Prof.Dr., supervisor Sekolah Informatiks Termaju NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / |
title | NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / |
title_full | NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / |
title_fullStr | NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / |
title_full_unstemmed | NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / |
title_short | NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / |
title_sort | network forensic investigation guideline for capturing steganography files in network traffic packets |
topic | Computer crimes Computer networks Data encryption (Computer science) |
work_keys_str_mv | AT ahmadshukrisamsuddin1982author networkforensicinvestigationguidelineforcapturingsteganographyfilesinnetworktrafficpackets AT azizahabdulmanafprofdrsupervisor networkforensicinvestigationguidelineforcapturingsteganographyfilesinnetworktrafficpackets AT sekolahinformatikstermaju networkforensicinvestigationguidelineforcapturingsteganographyfilesinnetworktrafficpackets |