Free Essay

Performance Analysis of Substitution Cipher Based Cryptographic Algorithm

In:

Submitted By egunsola
Words 1309
Pages 6
CURRICULUM VITAE

EGUNSOLA Olubola Kehinde

16, Adeolu Egunsola Street
Off Jibowu Estate Road
U-Turn Bus Stop Abule-Egba Lagos.

PERSONAL PORTFOLIO

Date of Birth 17th August 1972
Place of Birth Lagos State
State of Origin Ogun State
Nationality Nigerian
L.G.A Abeokuta South
Sex Male
Marital Status Married
Number of Child. Three Children, 8yrs, 5yrs, and 3yrs old
E-Mail egunsola_olubola @yahoo.com
Phone Number 08035855769 07086566947
Permanent Address 10, Ogere Road, Iperu-Remo, Ogun State.

EDUCATIONAL BACKGROUND

Institution Certificate Date

Federal University of Technology M.Tech 2010-2013
Yola, Adamawa State Operations Research option(Computer Simulation) Olabisi Onabanjo University Ago Iwoye B.Sc (Ed) 1997-2000
(Formerly Ogun State University) Computer Science

Federal College of Education Osiele N.C.E 1994-1996
Abeokuta Ogun State Computer Science/PSC

Egbado College Ilaro SSCE 1986-1991
Ogun State

U.A.M.C Primary School Ilaro FSLC 1980-1985
Ogun State

EXPERIENCES IN SOFTWARE DEVELOPMENT/PUBLICATIONS

1 Adeyemi Abel Ajibesin, Neco Ventura, H. Anthony Chan, Alexandru Murgu and Olubola Kehinde Egunsola, "Performance of Multicast Algorithms Over Coded Packet Wireless Networks," 14th International Conference on Modelling and Simulation, Cambridge, Cambridgeshire United Kingdom, March 28-30, 2012, Pages 596-600, ISBN:978-1-4673-1366-7, Published by IEEE, Computer Society Digital Library (CSDL), Indexed by IEEE Xplorer Digital Library: http://ieeexplore.ieee.org/xpl/articleDetails.jsp

2 Olubola Kehinde Egunsola, Adeyemi Abel Ajibesin, S. S. Abdulkadir and Valerie oni, "Optimal Design of Mobile E-Exam Processing System for Nigerian Universities," 5th International Conference on Democracy and Governance in Africa, Ecole polytechnique, Universite Du Abomey, Calavi Cotonou, Benin Republic, April 26-27, 2012, Pages 247-268, International Journal of Development Studies Vol. 6 No.5 2012. ISSN2141-8748

Adeyemi Abel Ajibesin, Gregory M. Wajiga, Mathew R. Odekunle, Olubola K. Egunsola: Energy-efficient Multicast in Wired and Wireless Networks: Analysis and Performance Measures. CICSyN 2013: 131-136

3 Olubola Kehinde Egunsola, Adeyemi Abel Ajibesin and Hamandikko Gaya Mu'azu, "The Role of Operations Research in Software Industry in Nigeria", 4th Annual National Professional Conference on The Role of Operations Research in Nigeria's Transformation Agenda, Adesba Int'l Hotel, Peanseke, Abeokuta, Ogun State, Nigeria, 24-28 October, 2011

4 Team leader, Development & Implementation of Enterprise Client-Server Applications (Window and Web based) named ExamCompute Software for the following operations: * On-line Semester Course Registration * On-line Checking of Result * Student Personal Data Capture * Computation and Generation of Semester Result * Generation of Student End of Session Result * Generation of Students Transcripts * Generation of Sessional Result For Consideration by Senate The Client-Server (Window Application) was developed with VB.NET as Front-end and Microsoft SQL Server as Back-end while (Web based Application) was developed with ASP.NET (July 2008 – December 2008) 5 Member of the team for the development and implementation of Online Application for UME, Pre-Degree and Direct Entry applicants using Microsoft SQL Server 2000 for the Back-end while PHP for the Front-end (June 2008). 6 Team leader for the development and implementation of a Client-Server Application named AutoGenMat Software used to generate Matriculation Numbers for the newly registered students into the University and to manage their personal data. The software was developed with VB.NET as Front-end and Microsoft SQL Server as Back-end (March 2008 – April 2008)

7 Team leader that designed General Administrative Software Package (GASP) with various modules included Students Registration, System Computation of Academic Scores, Generating Academic Report for The Bells Secondary School. The software was developed with C#.NET as Front-End and Microsoft SQL Server as Back-end (August 2006 – December 2006)

8 Team leader that developed Financial System Package (FSP) with the following modules Payroll and Tax Deduction System, and Ledger. The software was developed with VB.NET as Front-end and Microsoft SQL Server as Back-end (Nov 2005-June 2006) 9 Member of the team that designed Software on School Result computation named Graded Point Automated Database (GPAD) with various modules which include Computation of GP and CGPA for Students Academic records, Extraction of Students Transcript Records, Staff Payroll, and School General Ledger Accounting System. The software was developed using Visual Basic 6.0 as Front-end and Microsoft Access as the Back-end (Sep 2003 – Nov 2004).

WORK EXPERIENCE

Organisation (1) American University of Nigeria, Yola.
Date January 2010 – till date
Post Lecturer
Department Computer Science
School School of Information Technology & Communication
Responsibilities
Courses taught; * ITC101 (Introduction to Software Applications). * INF102 (Software Application I). * CSC101 (Program Logic and Design). * CIE105 (Principles of Programming I with Java). * CSC202 (Data Structures and Algorithm with Java) * INF260 (System Analysis and Design)

PROFESSIONAL BODY
IEEE Membership
IEEE Computer Society Membership: Membership No -92617098

COMMUNITY SERVICE i. ICT Training for Teachers in AUN Nursery & Primary School Yola, Adamawa State ii. ICT Training for Staff in Upper Benue River Basin Yola, Adamawa State.

CONFERENCE ATTENDED
4th Annual National Professional Conference; Theme- The Role of Operations Research in Nigeria’s Transformation Agenda. 24th -28th October, 2011
Paper Presented: The Role of Operations Research in Software Development Industry in Nigeria

Organisation (2) BELLS UNIVERSITY OF TECHNOLOGY OTA
Date March 2008 – 2010
Post Lecturer/Senior Programmer
Department Information and Communication Technology
Responsibilities
* Handling the following courses; CSC411(Database Management System), ITP401(World Wide Web System), CSC311(Object-Oriented Design). * Developing the students programming skills on Object Oriented Programming languages such as C#, VB.NET, Java, ASP.NET etc. * Handling of practical for Transact SQL using MS-SQL Server and MySQL. * Analysis of projects for system development. * Designing and developing architectural design for projects. * Development of both Web-based software and Window Application (Client Server) for the University. * Implementation and Management of the in-house software for the University. * Deployment and maintenance of software across various unit in the university. * Software Documentation and Staff training on how to use the in-house software. Organisation (3) Ile-Ife Polytechnic (Former Universal College of Technology, Ile-Ife) (Federal Government Approved Private Polytechnic)
Date 2001 – 2005
Post H.O.D (2001-2003)
Department Computer Science

Post Chief Programmer (2003-2005)
Department ICT Unit
Responsibilities
* Handling the following courses; CSC101(Introduction to computer science), CSC201(Data Structure and Algorithm), CSC203(Assembly Language), CSC121(Introduction to Programming Language I: C++ ), CSC203(System Analysis & Design). * Analysis of projects for system development * Designing and developing architectural design for projects * In-house software development and deployment for the institution * Software management and maintenance

Organisation (4) THE BELLS SECONDARY SCHOOL OTA
Date Oct 2005 – Feb 2008
Post Programmer and Database Administrator (HOD IT Unit)
Department ICT Unit
Responsibilities
* Developing Database Applications for various unit ; Academic unit, Bursary Department and Admin unit. * Organising IT workshop for both Teaching and Non-Teaching Staff on how to use Application packages, Electronic Interactive Board. * Managing Web-Portal for the school.

PROFICIENCIES

Programming Languages (Object Oriented Programming Languages) 1 Visual Studio.NET 2003 , 2005, 2008,2010 ( VB.NET,C# ) 1 Java 2 C# 3 C++ 4 Ruby 5 Alice Web Programming Languages 1. ASP.NET 2. PHP 3. HTML

Relational Database Management System 1 Microsoft SQL Server 2000 1 Microsoft SQL Server 2005, 2008 (Enterprise and Standard Edition) 2 MySQL 1 Microsoft Access 1 Visual FoxPro

Programming Reporting Tools 1. Crystal Report 10v, Crystal Report 11 2. Data Report.Net tool

Application Packages 1 Ms-Excel, Ms-Word, Page-Maker, Front Page, Ms-PowerPoint, Corel Draw and SPSS

SPECIAL ATTRIBUTION

1 Ability to work without supervision 2 System solution provider 2 Resource management 2 Positive thinking 2 Ability to learn fast

INTEREST
Reading, Playing musical instruments, table-tennis, and football

REFEREES
Senior Computer Programmer
Airtel Mr O.A Kumoye
Cards Limited Lagos
08039185377

Dr A. AbdulKadir
H.O.D
Department of Statistics and Operations Research
Federal University of Technology Yola,
Adamawa State.
08034981735

Professor Remi Odekunle
Dean of Post-Graduate School
Federal University of Technology Yola,
Adamawa State.
07035886807

Similar Documents

Free Essay

Performance Analysis of Substitution Cipher Based Cryptographic Algorithm

...Performance analysis of Substitution Cipher Based Cryptographic Algorithm Mihir Sanghavi 11MCA48, Student, MCA Programme, Institute of Technology, Nirma University, Ahmadabad Email: 11MCA48@nirmauni.ac.in Abstract Cryptography is the study of Encryption techniques related to aspects of information security, such as confidentially or privacy, data integrity and entity authentication. Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The main goal of cryptography is Confidentiality, Integrity, Authentication, Non repudiation. Cryptography is widely used by governmental and intelligence agencies around the world to safe transmission of any format of messages online or offline. In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with cipher text, according to a regular system; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution. Caesar cipher is an example of substitution cipher method. In this paper substitution cipher based cryptography algorithms are compared and performance is evaluated. Keywords Cryptography, substitution cipher, cryptanalysis, Caesar cipher, monoalphabetic cipher and Polyalphabetic cipher. Introduction A substitution...

Words: 2433 - Pages: 10

Free Essay

General Introductio

...NATIONAL UNIVERSITY OF RWANDA FACULTY OF APPLIED SCIENCES DEPARTMENT OF COMPUTER SCIENCE ACADEMIC YEAR 2011 Performance analysis of Encryption/Decryption algorithms using SimpleScalar By: MANIRIHO Malachie and NIZEYIMANA Jean-Paul Supervisor: Dr.-Ing. NIYONKURU Adronis Huye, 2011 CHAPTER ONE: GENERAL INTRODUCTION 1.1. BACKGROUND TO THE STUDY There are various security measures that can be imposed in order to secure the information stored. As more and more technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be...

Words: 7475 - Pages: 30

Free Essay

Partial Encryption on Fly

...A NOVEL APPROACH TO IMPLEMENT DISK SECURITY USING PARTIAL DISK ENCRYPTION Anurag Sharma M L Smitha Tarun T Arya Minal Moharir Information Science and Engineering RV College of Engineering The main objective of the paper is to develop an efficient and cost effective method for Hard Disk Drive(HDD) Security. The task is implemented using Partial Disk Encryption (PDE) with Advanced Encryption Standards(AES) for data security of Personal Computers(PCS) and Laptops . The focus of this work is to authenticate and protect the content of HDD from illegal use. The proposed method is labeled as DiskTrust. FDE encrypts entire content or a single volume on your disk. Symmetric key uses same key for encryption as well for decryption. DiskTrust uses these two technology to build cost effective solution for small scale applications. Finally, the applicability of these methodologies for HDD security will be evaluated on a set of data files with different key sizes. KEYWORDS- INFORMATION SECURITY, INTEGRITY, CONFIDENTIALITY, AUTHENTICATION, ENCRYPTION. I. INTRODUCTION In today’s world information security is an important concern for every individual. People spend hundreds of dollars in protecting their data to stay in the competition, and any leakage of crucial data can result in unrecoverable loss. Information security is the most important form of security even before network security, as information stored securely can only be transmitted securely over a network, there by...

Words: 2258 - Pages: 10

Premium Essay

Importance Of Cryptography

...necessary to know the method of securing data transmission by Cryptographic technique. 1.2 THE PURPOSE OF CRYPTOGRAPHY Cryptography is among one of the ancient arts of writing languages in secret code. In 1900 B.C an Egyptian scribe was the first document used inscription for cryptography. Some of the experts argued that cryptography writing has appeared simultaneously after the writing has been invented,...

Words: 10253 - Pages: 42

Premium Essay

Some Problems in Symmetric and

...Some Problems in Symmetric and Asymmetric Cryptography A thesis submitted for the partial fulfillment of the degree of Doctor of Philosophy in Mathematics By SANTOSH KUMAR YADAV Under the supervision of Prof. Sunder Lal and Prof. S. C. Arora DEPARTMENT OF MATHEMATICS DR. B. R. AMBEDKAR UNIVERSITY, AGRA (FORMERLY AGRA UNIVERSITY) 2010 *Sanskrit verse dating back to the pre-Christian era Dedicated to my Teachers, Friends, Students and Family Members DECLARATION I do hereby declare that the present research work has been carried out by me under the supervision of Prof. Sunder Lal and Prof. S. C. Arora. This work has not been submitted elsewhere for any other degree, diploma, fellowship or any other similar title. Santosh Kumar Yadav Research Scholar CERTIFICATE This is to certify that the thesis entitled “Some Problems in Symmetric and Asymmetric Cryptography” submitted to Dr. B.R.Ambedkar University, Agra for the degree of Doctor of Philosophy by Mr. Santosh Kumar Yadav, is a bonafide record of research work done by him under our supervision. To the best of our knowledge, this thesis has not previously formed the basis for the award to any candidate of any degree, diploma, fellowship or any other similar title and the work has not been submitted to any university or institution, for the award of any other degree. S. C. ARORA SUNDER LAL (Co-supervisor) (Supervisor) Professor Professor of Mathematics, and Department of Mathematics Pro-Vice Chancellor ...

Words: 37424 - Pages: 150

Free Essay

Digital Forensics - Uganda’s Preparedness

...Digital Forensics: Uganda’s Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented...

Words: 7291 - Pages: 30

Premium Essay

Pretty Good Privacy

...secure web services grows. There are two types of threats to the web services : 1.1 Passive attacks : It is eavesdropping on network traffic between browser and server and gaining access to information on a web site that is supposed to be restricted. 1.2 Active attack : It includes impersonating another user, altering messages in transit between client and server and altering information on a web site. In all distributed environment electronic mail is the most heavily used network based application. It is the only application that is widely used across all architecture and vendor platforms. Users expect to be able to and do, send mail to others who are connected directly or indirectly to the internet. PGP(Pretty Good Privacy) is an open-source freely available software for E-Mail security. It provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption, compression using the ZIP algorithm, E-Mail compatibility using the radix-64 encoding scheme and segmentation and reassembly to accommodate long e-mails. Chapter 2 Review of literature tells the need and appraisal of e-mail security Software. E-mail is well established as a prime means of communication for business purposes that is quicker and cheaper than more traditional methods. Thus is necessary to make one’s corporate messaging system as secure as...

Words: 27771 - Pages: 112

Premium Essay

Crhypho

...ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S. -4- TABLE OF CONTENTS Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20: Introduction ..................................................................................................5 Classical Encryption Techniques ...............................................................7 Block Ciphers and the Date Encryption Standard ................................13 Finite Fields .................................................................................................21 Advanced Encryption Standard ..............................................................28 More on Symmetric Ciphers ....................................................................33 Confidentiality Using Symmetric Encryption .......................................38 Introduction to Number Theory ..............................................................42 Public-Key Cryptography and RSA...

Words: 21497 - Pages: 86

Premium Essay

Sscp Study Notes

...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...

Words: 17808 - Pages: 72

Free Essay

التشفير وأمنية المعلومات

...الفصل الأول التعريف بتقنيات التشفير وأمنية المعلومات 1-1:المقدمة ( Introduction ): إن أمنية المعلومات ناتجة من الحاجة إلى تناقل المعلومات الخاصة لكل من العبارات العسكرية والدبلوماسيـة. هذه الحاجة هي قديمة بقدم الحضارة نفسها. الأسبان القدماء مثلا, شفروا عباراتهم العسكرية. أما بالنسبة للصين, فانه يكفي فقط كتابة العبارات بلغتهم المعروفة والتي تعبر لغة خاصة, وذلك لان القليل من الناس يستطيعون قراءة الحروف الصينية. كانت قنوات الاتصال في السابق بسيطة جدا وكانت ترتب بأسلوب يعتمد في تامين السري على استخدام مراسلين موثوقين. تعتمد الأمنية لمثل هذا التنظيم على كل من موضع الثقة للمراسل وقابليته في أن يبقى محتفظا بالمواقف أو المواقع التي فيها يمكن أن تتعرض العبارات للانتهاك. بسبب اكتشاف أنظمة الحاسبات واستخدام شبكات الحاسبة الواسعة بين الدول, فان القرن العشرين قد غير بصورة ملحوظة مدى مفاهيم الحماية. في الحاسبات المبكرة ( الأولى), فان الأمنية الفيزيائية ومعها سياسة الاختيار الملائم للكادر العامل في الحاسبة كان كافيا لتامين الأمنية. لكن هذا أصبح غير كاف وغير مرن بعد اكتشاف أنظمة حاسبات المشاركة الزمنية (Time-Sharing) والتي تتألف من عدة محطات طرفية موزعة في مساحة جغرافية واسعة. من الجدير بالذكر أن امن وسلامة اتصال,ت الالكترونية في بدء ظهورها لم يكن هاما لان معظم المعلومات المخزونة فيها لم تكن ذات حساسية كبيرة, بعكس ماهي عليه اليوم, إذ كلما ازدادت وارتفعت قيمة المعلومات المخزونة في الحاسبات الالكترونية كلما ازدادت الرغبة لدى بعض الأفراد لمحاولة الوصول إليها من اجل التخريب أو من اجل الكسب غير المشروع بواسطة بيعها إلى الجهات الراغبة بذلك, لذا فقد أصبح امن هذه المعلومات على درجة...

Words: 35136 - Pages: 141

Premium Essay

Syllabus

...Code 1. 2. 3. 4. 5. 6. CSE411 CSE461 CSE412 CSE462 CSE414 CSE464 Subject Title Scheme of Teaching L 3 0 3 0 3 0 T 1 0 1 0 1 0 P 0 3 0 3 0 3 Hours 4 3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50 100 50 50 50 50 50 50 100 50 100 50 3 3 15 0 1 4 0 0 9 3 4 28 3 4 25 50 50 250 50 50 400 100 100 650 2 Scheme of Examination of B.E. in Computer Science & Engineering Third Year - Fifth Semester Sr. Paper Subject Title Scheme of Teaching Univesity Internal Sessional Code External L T P Hou Credit Marks Total Marks rs s 1. CSE511 Operating System 3 1 0 4 4 50 50...

Words: 14784 - Pages: 60

Free Essay

Innovation and Erp Systems

...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3 rd th TO 8 Semester 2014-2015 University Institute of Engineering and Technology, Panjab University, Chandigarh DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING VISION: To be recognized as an international leader in Computer Science and Engineering education and research to benefit society globally. MISSION: · · · · To move forward as frontiers of human knowledge to enrich the citizen, the nation, and the world. To excel in research and innovation that discovers new knowledge and enables new technologies and systems. To develop technocrats, entrepreneurs, and business leaders of future who will strive to improve the quality of human life. To create world class computing infrastructure for the enhancement of technical knowledge in field of Computer Science and Engineering. PROGRAMME: B.E. CSE (UG PROGRAMME) PROGRAMME EDUCATIONAL OBJECTIVES: I. Graduates will work as software professional in industry of repute. II. Graduates will pursue higher studies and research in engineering and management disciplines. III. Graduates will work as entrepreneurs by establishing startups to take up projects for societal and environmental cause. PROGRAMME OUTCOMES: A. Ability to effectively apply knowledge of computing, applied sciences and mathematics to computer science & engineering problems. B. Identify, formulate, research literature, and analyze complex computer science & engineering problems reaching substantiated conclusions...

Words: 23989 - Pages: 96

Premium Essay

Netwrk Security

...Fundamentals of Network Security John E. Canavan Artech House Boston • London http://www.artechhouse.com Library of Congress Cataloging-in-Publication Data Canavan, John E. Fundamentals of network security / John E. Canavan. p. cm.—(Artech House telecommunications library) Includes bibliographical references and index. ISBN 1-58053-176-8 (alk. paper) 1. Computer security. 2. Computer networks—Security measures. I. Title. II. Series. QA76.9.A25 C364 2000 005.8—dc21 00-050810 CIP British Library Cataloguing in Publication Data Canavan, John E. Fundamentals of network security.—(Artech House telecommunications library) 1. Computer networks—Security measures I. Title 005.8 1-58053-176-8 Cover design by Yekaterina Ratner Microsoft ® screen shots reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street...

Words: 95027 - Pages: 381

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Free Essay

Ethical Hacking

...This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated...

Words: 185373 - Pages: 742