Search Books

Adopting hadith verification techniques in to digital evidence authentication.(Report): An article from: Journal of Computer Science

Author Yunus Yusoff, Roslan Ismail, Zainuddin Hassan
Publisher Science Publications
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
9.95 USD
🛒 Buy New on Amazon 🇺🇸

✓ Available for download now

Share:
Book Details
ISBN / ASINB003S0WZCU
ISBN-13978B003S0WZC9
AvailabilityAvailable for download now
MarketplaceUnited States 🇺🇸

Description

This digital document is an article from Journal of Computer Science, published by Science Publications on June 1, 2010. The length of the article is 4372 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available immediately after purchase. You can view it with any web browser.

From the author: Key words: Computer forensics, digital evidence authentication, hadith authentication

Citation Details
Title: Adopting hadith verification techniques in to digital evidence authentication.(Report)
Author: Yunus Yusoff
Publication:Journal of Computer Science (Magazine/Journal)
Date: June 1, 2010
Publisher: Science Publications
Volume: 6 Issue: 6 Page: 591(6)

Article Type: Report

Distributed by Gale, a part of Cengage Learning