Skip to content
VuFind
  • 我的帐户
  • 退出
  • 登录
  • Theme
    • Bootstrap
    • MALrep
  • 语言
    • English
    • 日本語
    • 中文(简体)
    • 中文(繁體)
    • اللغة العربية
高级检索
  • Email security issues, tools,...
  • 持有资料
  • 引用
  • 发送短信
  • 推荐此
  • 导出纪录
    • 导出到 RefWorks
    • 导出到 EndNoteWeb
    • 导出到 EndNote
  • 加到收藏夹
封面图片

Email security issues, tools, and techniques used in investigation

The email system is a globally distributed communication infrastructure service that involves multiple actors playing different roles to ensure end-to-end mail delivery. It is an indispensable method of communicating that is changing how people share data and information. As a result, it facilitates...

全面介绍

Saved in:
书目详细资料
Main Authors: Esra, Altulaihan, Abrar, Alismail, Rahman, M.M. Hafizur, Abubakar, Adamu
格式: Article
语言:English
English
出版: MDPI 2023
主题:
Q300 Cybernetics
在线阅读:http://irep.iium.edu.my/106528/7/106528_Email%20Security%20Issues%2C%20Tools%2C%20and%20Techniques%20Used%20in%20Investigation.pdf
http://irep.iium.edu.my/106528/8/106528_Email%20Security%20Issues%2C%20Tools%2C%20and%20Techniques%20Used%20in%20Investigation_SCOPUS.pdf
http://irep.iium.edu.my/106528/
https://www.mdpi.com/journal/sustainability
https://doi.org/10.3390/su151310612
标签: 添加标签
没有标签, 成为第一个标记此记录!
  • 持有资料
  • 实物特征
  • 您的评论
  • 相似书籍
  • 职员浏览

因特网

http://irep.iium.edu.my/106528/7/106528_Email%20Security%20Issues%2C%20Tools%2C%20and%20Techniques%20Used%20in%20Investigation.pdf
http://irep.iium.edu.my/106528/8/106528_Email%20Security%20Issues%2C%20Tools%2C%20and%20Techniques%20Used%20in%20Investigation_SCOPUS.pdf
http://irep.iium.edu.my/106528/
https://www.mdpi.com/journal/sustainability
https://doi.org/10.3390/su151310612

相似书籍

  • Threats from unintentional insiders: an assessment of an organization’s readiness using machine learning
    由: Hafizur Rahman, M. M., et al.
    出版: (2022)
  • Feature selection using generalized linear model for Machine Learning-based sepsis prediction
    由: Mohammed Ashikur, Rahman, et al.
    出版: (2023)
  • Streams of data flow in transmission control protocol (TCP) request-response cycle efficiency
    由: Abubakar, Adamu, et al.
    出版: (2024)
  • Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
    由: Ahmed Khan, Fazeel, et al.
    出版: (2024)
  • Non-fungible token based smart manufacturing to scale Industry 4.0 by using augmented reality, deep learning and industrial Internet of Things
    由: Ahmed Khan, Fazeel, et al.
    出版: (2023)

检索选项

  • 检索历史
  • 高级检索

查找更多

  • 浏览目录
  • 按字母顺序浏览
  • Explore Channels
  • 课程储备
  • 新项目

需要帮助?

  • 检索技巧
  • 咨询台
  • 常见问题
载入...