Guideline for forensic analysis on windows XP and vista registry
On the age of digitalization world and dependencies of people to digital system having a schedule to protect their assets is obvious. Digital hacking is always one of hot subject in information security field. So many organizations need special training to be covered and protected against hackers. A...
| Main Author: | Aghanvesi, Somayeh |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9517/ http://eprints.utm.my/9517/1/SomayehAghanavesiMFSKSM2008.pdf |
Similar Items
Making Windows XP more like Vista
Published: (2008)
Published: (2008)
Forensics visualization of Windows 10 registry
by: Awang, Muhamad Safwan
Published: (2019)
by: Awang, Muhamad Safwan
Published: (2019)
An evidence-based forensic taxonomy of Windows phone communication apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Comprehensive analysis on hardware forensic for gambling machine
by: Magalingam, Pritheega
Published: (2008)
by: Magalingam, Pritheega
Published: (2008)
Vista : In Or Out ?
Published: (2008)
Published: (2008)
Vista to come in six flavours
Published: (2008)
Published: (2008)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
by: Z. L., Chuan, et al.
Published: (2017)
by: Z. L., Chuan, et al.
Published: (2017)
Windows 10 instant messaging application forensics
by: Shehu, Aliyu Usman
Published: (2018)
by: Shehu, Aliyu Usman
Published: (2018)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
A guideline for using web-based AHP system
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
Feature engineering techniques to classify cause of death from forensic autopsy reports / Ghulam Mujtaba
by: Ghulam , Mujtaba
Published: (2018)
by: Ghulam , Mujtaba
Published: (2018)
Implementation guidelines of the walk-through and questionnaire techniques in the usability testing of the scrum method
by: Muhammad, A. Khairuddin, et al.
Published: (2006)
by: Muhammad, A. Khairuddin, et al.
Published: (2006)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Semi - automated software requirement specification (SRS) document generator: The guideline to novice system analyst
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2021)
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2021)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000)
by: D. C. L., Ngo, et al.
Published: (2000)
New usability guidelines with implementation ways of mobile learning application based on mobile learning usability attributes
by: Hujainah, Fadhl, et al.
Published: (2016)
by: Hujainah, Fadhl, et al.
Published: (2016)
CDS523 – Forensic Analytics and Digital Investigations June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS523 – Forensic Analytics and Digital Investigations June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
Web design attributes guideline to reinforce user trust, satisfaction, and loyalty for Malaysian university students / Ranjen Naidu Vasudiven
by: Ranjen Naidu , Vasudiven
Published: (2021)
by: Ranjen Naidu , Vasudiven
Published: (2021)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
The development of a for Pejabat Harta Bina, Universiti Teknologi Malaysia : a study for the guidelines
by: Mohammad, Izran Sarrazin
Published: (2005)
by: Mohammad, Izran Sarrazin
Published: (2005)
A Privacy Framework And Guidelines For Psychiatric Behavioural Monitoring System
by: Ramli, Rusyaizila
Published: (2016)
by: Ramli, Rusyaizila
Published: (2016)
Computer Aided 3d Skull - 2d Photo Superimposition For Forensic Anthropology
by: Tan, Joi San
Published: (2017)
by: Tan, Joi San
Published: (2017)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Guidelines and Assessment Tool for Making Web Text Legible on Full High Definition Display
by: Ahmad Affendi, Hashim, et al.
Published: (2012)
by: Ahmad Affendi, Hashim, et al.
Published: (2012)
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application
by: Zun Liang, Chuan, et al.
Published: (2023)
by: Zun Liang, Chuan, et al.
Published: (2023)
Similar Items
-
Making Windows XP more like Vista
Published: (2008) -
Forensics visualization of Windows 10 registry
by: Awang, Muhamad Safwan
Published: (2019) -
An evidence-based forensic taxonomy of Windows phone communication apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018) -
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011) -
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)