NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /

Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015

Bibliographic Details
Main Authors: Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju
Format:
Language:eng
Published: Kuala Lumpur : Universiti Teknologi Malaysia , 2016
Subjects:
_version_ 1796756228189192192
author Ahmad Shukri Samsuddin, 1982-, author
Azizah Abdul Manaf, Prof.Dr., supervisor
Sekolah Informatiks Termaju
author_facet Ahmad Shukri Samsuddin, 1982-, author
Azizah Abdul Manaf, Prof.Dr., supervisor
Sekolah Informatiks Termaju
author_sort Ahmad Shukri Samsuddin, 1982-, author
collection OCEAN
description Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015
first_indexed 2024-03-05T15:13:49Z
format
id KOHA-OAI-TEST:534268
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T15:13:49Z
publishDate 2016
publisher Kuala Lumpur : Universiti Teknologi Malaysia ,
record_format dspace
spelling KOHA-OAI-TEST:5342682020-12-19T17:20:08ZNETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS / Ahmad Shukri Samsuddin, 1982-, author Azizah Abdul Manaf, Prof.Dr., supervisor Sekolah Informatiks Termaju Kuala Lumpur : Universiti Teknologi Malaysia ,2016engThesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015Includes bibliographical referencesPSZKLLComputer crimesComputer networksData encryption (Computer science)
spellingShingle Computer crimes
Computer networks
Data encryption (Computer science)
Ahmad Shukri Samsuddin, 1982-, author
Azizah Abdul Manaf, Prof.Dr., supervisor
Sekolah Informatiks Termaju
NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
title NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
title_full NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
title_fullStr NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
title_full_unstemmed NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
title_short NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETS /
title_sort network forensic investigation guideline for capturing steganography files in network traffic packets
topic Computer crimes
Computer networks
Data encryption (Computer science)
work_keys_str_mv AT ahmadshukrisamsuddin1982author networkforensicinvestigationguidelineforcapturingsteganographyfilesinnetworktrafficpackets
AT azizahabdulmanafprofdrsupervisor networkforensicinvestigationguidelineforcapturingsteganographyfilesinnetworktrafficpackets
AT sekolahinformatikstermaju networkforensicinvestigationguidelineforcapturingsteganographyfilesinnetworktrafficpackets