VALIDASI E-MAIL SPOOFING
Abstract
Full Text:
PDF (Indonesian)References
Daftar Pustaka
APJII. (2018).Penetrasi & Perilaku Pengguna Internet Indonesia 2018. From http://apjii.com
Muhammad Nuh Al-Azhar (2012). Digital Forensic Panduan Praktis Investigasi Komputer. Jakarta : Salemba Infotek.
Jayan, A., & S, D. (2015). Detection of Spoofed Mails. Retrieved from http://www.fraudguides.com/internet/detect-spoofed- e-mails/
Gupta, S., Pilli, E. S., Mishra, P., Pundir, S., & Joshi, R. C. (2014). Forensic Analysis of E-mail Address Spoofing, 898–904.
Karie, N. M., & Venter, H. S. (2014). Towards a General Ontology for Digital Forensic Disciplines, 1–29. Retrieved from https://books.google.co.id/books?isbn-1910810827
Kurniawan, H. (2005). Panduan Praktis Instalasi E-mail Server Gratis Berbasis Windows Menggunakan hMailServer. Jakarta: PT. Elex Media Komputindo
Chhabra, G. S. (2015). Review of E-mail System , Security Protocols and E-mail Forensics, 5(3), 201–211.
Devendran, V. K., Shahriar, H., & Clincy, V. (2015). A Comparative Study of E-mail Forensic Tools. Journal of Information Security, 06(02),111–117. doi:10.4236/jis.2015.62012
Rafiudin, R. (2009). Investigasi Sumber-sumber Kejahatan Internet : Internet Forensics. (N. WK, Ed.). Andi. doi:10987654321
https://www.masterpendidikan.com/2017/01/10-pengertian-email-menurut-para-ahli.htm
Jean-François Pillou https://id.ccm.net/contents/21-struktur-email-header-dan-badan-email
Banday, M. T. (2011). Analysing internet e-mail date spoofing, vol.7, 145–143. Retrieved from dl.acm.org/citation.cfm?id=2296268
Chandraleka, H. (2009). Trik Mengantisipasi Hacking E-mail. (I. Rouf, Ed.) (1st ed.). Jakarta: mediakita.[11] Abdussalam. (2006). Forensik. (T. R. Agung, Ed.).Jakarta: Restu Agung.
Banday, M. T. (2011). T ECHNIQUES AND T OOLS FOR F ORENSIC I NVESTIGATION OF E- MAIL, 3(6), 227–241. Retrieved from airccse.org/journal/nsa/1111nsa17.pdf
Karsono, K.(2012). FORENSIK E-MAIL. Retrieved from http://ejurnal.esaunggul.ac.id/index.php/Formil/arti cle/download/791/724
DOI: http://dx.doi.org/10.37438/jimp.v5i3.217
Copyright (c) 2021 J I M P - Jurnal Informatika Merdeka Pasuruan