Proposed computer forensic approach for cloud computing environment

The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducin...

Penerangan Penuh

Disimpan dalam:
Butiran Bibliografi
Pengarang-pengarang Utama: Ahmed, M., Samy, G. N., Maarop, N., Shanmugam, B., Magalingam, P., Ahmad, R.
Format: Artikel
Diterbitkan: American Scientific Publishers 2016
Subjek-subjek:
Capaian Atas Talian:http://eprints.utm.my/71771/
http://eprints.utm.my/71771/
Penanda-penanda: Tambah Penanda
Tiada Penanda, Jadilah orang pertama menanda rekod ini!
Jadilah orang pertama meninggalkan komen!
Anda perlu log masuk dahulu