ARTIFICIAL INTELLIGENCE:-
A major problem in the study of intelligence and cognition is the range of often implicit assumptions about what phenomena these terms are meant to cover. Are we just talking about cognition as having and using knowledge, or are we also talking about other mental states such as emotions and subjective awareness? Are we talking about intelligence as an abstract set of capacities, or as a set of biological mechanisms and phenomena? These two questions set up two dimensions of discussion about intelligence. After we discuss these dimensions we will discuss information processing, representation, and cognitive architectures.
Download
NETWORK SECURITY:-
Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them. Some history of networking is included, as well as an introduction to TCP/IP and internet working . We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices. This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality. It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.
Download
DATA WAREHOUSING:-
Organisations are today suffering from a malaise of data overflow. The developments in the transaction processing technology has given rise to a situation where the amount and rate ofdata capture is very high, but the processing of this data into information that can be utilised for decision making, is not developing at the same pace. Data warehousing and data mining (both data & text) provide a technology that enables the decision-maker in the corporate sector/govt. to process this huge amount of data in a reasonable amount of time, to extract intelligence/knowledge in a near real time. The data warehouse allows the storage of data in a format that facilitates its access, but if the tools for deriving information and/or knowledge and presenting them in a format that is useful for decision making are not provided the whole rationale for the existence of the warehouse disappears. Various technologies for extracting new insight from the data warehouse have come up which we classify loosely as "Data Mining Techniques".
Download
STEGANOGRAPHY:-
Johannes Trithemius (1462-1516) was a German Abbot. His writing, Steganographia: hoe est ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa is ostensibly a work describing methods to communicate with spirits. A rough translation of the Latin title is: Steganography: the art through which writing is hidden requiring recovery by the minds of men. Although people have hidden secrets in plain sight now called steganography throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques.
Download
WEB TECHNOLOGIES:-
Hypertext Markup Language (HTML) is a language to specify the structure of documents for retrieval across the Internet using browser programs of the World Wide Web. HTML is an application of the Standard Generalized Markup Language(SGML). The principle is that text markup concentrates on structure rather than appearance, making the files more reuseable and leaving the visual details to the end-user softwareThe Universal Resource Locator (URL) is the `address' of a resource in the Web. It could be a file, or an index, or some program that does processing. The Web was an interesting but not particularly exciting tool used by scientific researches-until 1993, when Mosaic, a point-and-click Web browser, was developed at the National Center for Supercomputing Applications (NCSA). In olden days the web technology used for creating web pages is HTML (Hyper Text Markup Language). Now a days the most efficient and advanced Web technologies using are XML (eXtensive Markup Language), DOTNET and ASP.NET.
Download
Dwonload
INTERNET FIREWALLS
The Internet has made large amount of information available to the average computer user at home, in business and education. For many people, having access to this information is no longer just an advantage, it is essential. By connecting a private network to the Internet can expose critical or confidential data to malicious attack from anywhere in the world. The intruders could gain access to your sites private information or interfere with your use of your own systems. Users who connect their computers to the Internet must be aware of these dangers, their implications and how to protect their data and their critical systems. Therefore, security of network is the main criteria here and firewalls provide this security. The Internet firewalls keep the flames of Internet hell out of your network or, to keep the members of your LAN pure by denying them access the all the evil Internet temptations. Download the Presentation from the Below Link
Download
CRYPTOGRAPHY
E-commerce on the worldwide web is a rapidly growing and proliferating field. But there are several differences between commerce in the real world and on the Internet, and perhaps the most fundamental issue is that of trust and security. In order to build secure E-commerce applications, we need to establish a definition of various security requirements.
Download
WI-FI
The IEEE 802.11 working group published the 802.11 standard for wireless LANs in 1999.802.11b is a supplement to 802.11 that specifies a higher data rate and is currently the industry-accepted standard for WLANs. 802.11b products that meet a base standard of interoperability are certified by the Wireless Ethernet Compatibility Alliance (WECA) with the Wi-Fi logo.
Download
IP Security
In today's massively interconnected business world of the Internet, intranets, branch offices, and remote access, sensitive information constantly crosses the networks. The challenge for network administrators and other IS professionals is to ensure that this traffic is:
Download
Wednesday, January 6, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment