Digital forensic investigation of trojan attacks in network using wireshark, FTK imager and volatility / Muhamad Arif Hashim ... [et al.]
Trojan attacks are the most common and serious threat to network users. It is a program that appears to be useful program but actually harmful one. It is difficult to detect Trojan attacks because it uses special techniques to conceal its activities from antiviruses and users. Thus, this research in...
Saved in:
Main Authors: | Hashim, Muhamad Arif (Author), Abd Halim, Iman Hazwam (Author), Ismail, Mohammad Hafiz (Author), Mohd Noor, Norfaizalfarid (Author), Mohd Fuzi, Mohd Faris (Author), Mohammed, Abdul Hapes (Author), JM. Gining, Ray Adderley (Author) |
---|---|
Format: | Book |
Published: |
UiTM Cawangan Perlis,
2017.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
ANALISIS SERANGAN SIBER DENGAN WIRESHARK UNTUK NETWORK FORENSIC
by: Ilham Fadilah,
Published: (2021) -
The Trojan Women of Euripides
by: Euripides, 481? BCE-407 BCE; Murray, Gilbert, 1866-1957 [Translator] -
The Trojan women of Euripides
by: Euripides, 481? BCE-407 BCE; Murray, Gilbert, 1866-1957 [Translator] -
The Trojan Horse The Growth of Commercial Sponsorship
by: Philips, Deborah
Published: (2013) -
The Trojan Horse The Growth of Commercial Sponsorship
by: Philips, Deborah
Published: (2013)