SlideShare a Scribd company logo
1 of 106
Network Security
Chapter 8
DNS – The Domain Name System
• The DNS Name Space
• Resource Records
• Name Servers
The DNS Name Space
A portion of the Internet domain name space.
Resource Records
The principal DNS resource records types.
Resource Records (2)
A portion of a possible DNS database for cs.vu.nl.
Name Servers
Part of the DNS name space showing the division into zones.
Name Servers (2)
How a resolver looks up a remote name in eight steps.
Electronic Mail
• Architecture and Services
• The User Agent
• Message Formats
• Message Transfer
• Final Delivery
Electronic Mail (2)
Some smileys. They will not be on the final exam :-).
Architecture and Services
Basic functions
• Composition
• Transfer
• Reporting
• Displaying
• Disposition
The User Agent
Envelopes and messages. (a) Paper mail. (b) Electronic mail.
Reading E-mail
An example display of the contents of a mailbox.
Message Formats – RFC 822
RFC 822 header fields related to message transport.
Message Formats – RFC 822 (2)
Some fields used in the RFC 822 message header.
MIME – Multipurpose Internet Mail
Extensions
Problems with international languages:
• Languages with accents
(French, German).
• Languages in non-Latin alphabets
(Hebrew, Russian).
• Languages without alphabets
(Chinese, Japanese).
• Messages not containing text at all
(audio or images).
MIME (2)
RFC 822 headers added by MIME.
MIME (3)
The MIME types and subtypes defined in RFC 2045.
MIME (4)
A multipart message containing enriched and audio alternatives.
Message Transfer
Transferring a message
from elinore@abc.com
to carolyn@xyz.com.
Final Delivery
(a) Sending and reading mail when the receiver has a permanent
Internet connection and the user agent runs on the same machine as
the message transfer agent. (b) Reading e-mail when the receiver has
a dial-up connection to an ISP.
POP3
Using POP3 to fetch three messages.
IMAP
A comparison of POP3 and IMAP.
The World Wide Web
• Architectural Overview
• Static Web Documents
• Dynamic Web Documents
• HTTP – The HyperText Transfer Protocol
• Performance Ehnancements
• The Wireless Web
Architectural
Overview
(a) A Web page (b) The page reached by clicking on
Department of Animal Psychology.
Architectural Overview (2)
The parts of the Web model.
The Client Side
(a) A browser plug-in. (b) A helper application.
The Server Side
A multithreaded Web server with a front end and processing modules.
The Server Side (2)
A server farm.
The Server Side (3)
(a) Normal request-reply message sequence.
(b) Sequence when TCP handoff is used.
URLs – Uniform Resource Locaters
Some common URLs.
Statelessness and Cookies
Some examples of cookies.
HTML – HyperText Markup Language
(a) The HTML for a sample Web page. (b) The formatted page.
(b)
HTML (2)
A selection of common HTML tags.
some can have additional parameters.
Forms
(a) An HTML table.
(b) A possible rendition of this
table.
Forms (2)
(a) The HTML for an
order form.
(b) The formatted page.
(b)
Forms (3)
A possible response from the browser to the server with information
filled in by the user.
XML and XSL
A simple Web page
in XML.
XML and XSL (2)
A style sheet in
XSL.
Dynamic Web Documents
Steps in processing the information from an HTML form.
Cryptography
• Introduction to Cryptography
• Substitution Ciphers
• Transposition Ciphers
• One-Time Pads
• Two Fundamental Cryptographic Principles
Need for Security
Some people who cause security problems and why.
An Introduction to Cryptography
The encryption model (for a symmetric-key cipher).
Transposition Ciphers
A transposition cipher.
One-Time Pads
The use of a one-time pad for encryption and the
possibility of getting any possible plaintext from
the ciphertext by the use of some other pad.
Quantum Cryptography
An example of quantum cryptography.
Symmetric-Key Algorithms
• DES – The Data Encryption Standard
• AES – The Advanced Encryption Standard
• Cipher Modes
• Other Ciphers
• Cryptanalysis
Product Ciphers
Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product.
Data Encryption Standard
The data encryption standard. (a) General outline.
(b) Detail of one iteration. The circled + means exclusive OR.
Triple DES
(a) Triple encryption using DES. (b) Decryption.
AES – The Advanced Encryption Standard
Rules for AES proposals
1. The algorithm must be a symmetric block cipher.
2. The full design must be public.
3. Key lengths of 128, 192, and 256 bits supported.
4. Both software and hardware implementations required
5. The algorithm must be public or licensed on
nondiscriminatory terms.
AES (2)
An outline of
Rijndael.
AES (3)
Creating of the state and rk arrays.
Electronic Code Book Mode
The plaintext of a file encrypted as 16 DES blocks.
Cipher Block Chaining Mode
Cipher block chaining. (a) Encryption. (b) Decryption.
Cipher Feedback Mode
(a) Encryption. (c) Decryption.
Stream Cipher Mode
A stream cipher. (a) Encryption. (b) Decryption.
Counter Mode
Encryption using counter mode.
Cryptanalysis
Some common symmetric-key cryptographic algorithms.
Public-Key Algorithms
• RSA
• Other Public-Key Algorithms
RSA
An example of the RSA algorithm.
Digital Signatures
• Symmetric-Key Signatures
• Public-Key Signatures
• Message Digests
• The Birthday Attack
Symmetric-Key Signatures
Digital signatures with Big Brother.
Public-Key Signatures
Digital signatures using public-key cryptography.
Message Digests
Digital signatures using message digests.
SHA-1
Use of SHA-1 and RSA for signing nonsecret messages.
SHA-1 (2)
(a) A message padded out to a multiple of 512 bits.
(b) The output variables. (c) The word array.
Management of Public Keys
• Certificates
• X.509
• Public Key Infrastructures
Problems with Public-Key Encryption
A way for Trudy to subvert public-key encryption.
Certificates
A possible certificate and its signed hash.
X.509
The basic fields of an X.509 certificate.
Public-Key Infrastructures
(a) A hierarchical PKI. (b) A chain of certificates.
Communication Security
• IPsec
• Firewalls
• Virtual Private Networks
• Wireless Security
IPsec
The IPsec authentication header in transport mode for IPv4.
IPsec (2)
(a) ESP in transport mode. (b) ESP in tunnel mode.
Firewalls
A firewall consisting of two packet filters and an application gateway.
Virtual Private Networks
(a) A leased-line private network. (b) A virtual private network.
802.11 Security
Packet encryption using WEP.
Authentication Protocols
• Authentication Based on a Shared Secret Key
• Establishing a Shared Key: Diffie-Hellman
• Authentication Using a Key Distribution Center
• Authentication Using Kerberos
• Authentication Using Public-Key Cryptography
Authentication Based on a Shared Secret Key
Two-way authentication using a challenge-response protocol.
Authentication Based on a Shared Secret Key (2)
A shortened two-way authentication protocol.
Authentication Based on a Shared Secret Key (3)
The reflection attack.
Authentication Based on a Shared Secret Key (4)
A reflection attack on the protocol of Fig. 8-32.
Authentication Based on a Shared Secret Key (5)
Authentication using HMACs.
Establishing a Shared Key:
The Diffie-Hellman Key Exchange
The Diffie-Hellman key exchange.
Establishing a Shared Key:
The Diffie-Hellman Key Exchange
The bucket brigade or man-in-the-middle attack.
Authentication Using a Key Distribution Center
A first attempt at an authentication protocol using a KDC.
Authentication Using a Key Distribution Center (2)
The Needham-Schroeder authentication protocol.
Authentication Using a Key Distribution Center (3)
The Otway-Rees authentication protocol (slightly simplified).
Authentication Using Kerberos
The operation of Kerberos V4.
Authentication Using Public-Key Cryptography
Mutual authentication using public-key cryptography.
E-Mail Security
• PGP – Pretty Good Privacy
• PEM – Privacy Enhanced Mail
• S/MIME
PGP – Pretty Good Privacy
PGP in operation for sending a message.
PGP – Pretty Good Privacy (2)
A PGP message.
Web Security
• Threats
• Secure Naming
• SSL – The Secure Sockets Layer
• Mobile Code Security
Secure Naming
(a) Normal situation. (b) An attack based on breaking
into DNS and modifying Bob's record.
Secure Naming (2)
How Trudy spoofs Alice's ISP.
Secure DNS
An example RRSet for bob.com. The KEY record is Bob's
public key. The SIG record is the top-level com server's
signed has of the A and KEY records to verify their
authenticity.
Self-Certifying Names
A self-certifying URL containing a hash of server's
name and public key.
SSL—The Secure Sockets Layer
Layers (and protocols) for a home user browsing with SSL.
SSL (2)
A simplified version of the SSL connection establishment subprotocol.
SSL (3)
Data transmission using SSL.
Java Applet Security
Applets inserted into a Java Virtual Machine
interpreter inside the browser.
Social Issues
• Privacy
• Freedom of Speech
• Copyright
Anonymous Remailers
Users who wish anonymity chain requests through
multiple anonymous remailers.
Freedom of Speech
Possibly banned material:
1. Material inappropriate for children or teenagers.
2. Hate aimed at various ethnic, religious, sexual, or other
groups.
3. Information about democracy and democratic values.
4. Accounts of historical events contradicting the
government's version.
5. Manuals for picking locks, building weapons, encrypting
messages, etc.
Steganography
(a) Three zebras and a tree. (b) Three zebras, a tree, and the
complete text of five plays by William Shakespeare.

More Related Content

What's hot

Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 
06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dnsPalanivel Kuppusamy
 
keti companion classifier
keti companion classifierketi companion classifier
keti companion classifierJEE HYUN PARK
 
Lightweight Deposit using SWORD
Lightweight Deposit using SWORDLightweight Deposit using SWORD
Lightweight Deposit using SWORDAdrian Stevenson
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik TambekarPratik Tambekar
 
My Seminar on DNS
My Seminar on DNSMy Seminar on DNS
My Seminar on DNSLijo George
 
DNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul IslamDNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul IslamMyNOG
 
Building a Linux IPv6 DNS Server Project review PPT v3.0 First review
Building a Linux IPv6 DNS Server Project review PPT v3.0 First reviewBuilding a Linux IPv6 DNS Server Project review PPT v3.0 First review
Building a Linux IPv6 DNS Server Project review PPT v3.0 First reviewHari
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersDenis Kolegov
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersDenis Kolegov
 
IPv6 Addressing and Deployment Considerations
IPv6 Addressing and Deployment ConsiderationsIPv6 Addressing and Deployment Considerations
IPv6 Addressing and Deployment ConsiderationsMd. Abdul Awal
 

What's hot (20)

6421 b Module-04
6421 b Module-046421 b Module-04
6421 b Module-04
 
Lab 04
Lab 04Lab 04
Lab 04
 
main
mainmain
main
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dns
 
Lets talk dns
Lets talk dnsLets talk dns
Lets talk dns
 
keti companion classifier
keti companion classifierketi companion classifier
keti companion classifier
 
Lightweight Deposit using SWORD
Lightweight Deposit using SWORDLightweight Deposit using SWORD
Lightweight Deposit using SWORD
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
 
The History of DNS
The History of DNSThe History of DNS
The History of DNS
 
Distributed System by Pratik Tambekar
Distributed System by Pratik TambekarDistributed System by Pratik Tambekar
Distributed System by Pratik Tambekar
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
My Seminar on DNS
My Seminar on DNSMy Seminar on DNS
My Seminar on DNS
 
DNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul IslamDNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul Islam
 
Building a Linux IPv6 DNS Server Project review PPT v3.0 First review
Building a Linux IPv6 DNS Server Project review PPT v3.0 First reviewBuilding a Linux IPv6 DNS Server Project review PPT v3.0 First review
Building a Linux IPv6 DNS Server Project review PPT v3.0 First review
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
 
Dns
DnsDns
Dns
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
 
IPv6 Addressing and Deployment Considerations
IPv6 Addressing and Deployment ConsiderationsIPv6 Addressing and Deployment Considerations
IPv6 Addressing and Deployment Considerations
 
Security (FE)
Security (FE)Security (FE)
Security (FE)
 

Similar to Chapter 9 security

Application layer
Application layerApplication layer
Application layerVipin Nagar
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)Nitesh Singh
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batchJaimin Jani
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
Uncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRCUncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRCDerek Callaway
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in detailsapel7
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Positive Hack Days
 
HTTP protocol and Streams Security
HTTP protocol and Streams SecurityHTTP protocol and Streams Security
HTTP protocol and Streams SecurityBlueinfy Solutions
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windowsniteshitimpulse
 
Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdfYogeshwaran R
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptxFidaBaloch8
 

Similar to Chapter 9 security (20)

Network security
Network securityNetwork security
Network security
 
Application layer
Application layerApplication layer
Application layer
 
New tcp-ip model
New tcp-ip modelNew tcp-ip model
New tcp-ip model
 
New tcp-ip model (2)
New tcp-ip model (2)New tcp-ip model (2)
New tcp-ip model (2)
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Uncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRCUncloaking IP Addresses on IRC
Uncloaking IP Addresses on IRC
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Small office Home office , network setup in details
Small office Home office , network setup in detailsSmall office Home office , network setup in details
Small office Home office , network setup in details
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
HTTP protocol and Streams Security
HTTP protocol and Streams SecurityHTTP protocol and Streams Security
HTTP protocol and Streams Security
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
 
Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
 
unit2-210710110327.pptx
unit2-210710110327.pptxunit2-210710110327.pptx
unit2-210710110327.pptx
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptx
 

More from Naiyan Noor

Diploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdfDiploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdfNaiyan Noor
 
Advanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdfAdvanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdfNaiyan Noor
 
HTML and CSS in depth.pdf
HTML and CSS in depth.pdfHTML and CSS in depth.pdf
HTML and CSS in depth.pdfNaiyan Noor
 
Skills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noorSkills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noorNaiyan Noor
 
English for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdfEnglish for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdfNaiyan Noor
 
Data Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdfData Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdfNaiyan Noor
 
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdfDatabases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdfNaiyan Noor
 
Data Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdfData Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdfNaiyan Noor
 
Tools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdfTools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdfNaiyan Noor
 
What is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdfWhat is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdfNaiyan Noor
 
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdfProgramming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdfNaiyan Noor
 
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdfHTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdfNaiyan Noor
 
Introduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdfIntroduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdfNaiyan Noor
 
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...Naiyan Noor
 
Social Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdfSocial Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdfNaiyan Noor
 
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdfMotor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdfNaiyan Noor
 
Web Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdfWeb Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdfNaiyan Noor
 
Python Course Basic
Python Course BasicPython Course Basic
Python Course BasicNaiyan Noor
 
Linux Presentation
Linux PresentationLinux Presentation
Linux PresentationNaiyan Noor
 
UQx ieltsx certificate | edX
UQx ieltsx certificate | edXUQx ieltsx certificate | edX
UQx ieltsx certificate | edXNaiyan Noor
 

More from Naiyan Noor (20)

Diploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdfDiploma in Computer Science and ICT.pdf
Diploma in Computer Science and ICT.pdf
 
Advanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdfAdvanced Learning Algorithms.pdf
Advanced Learning Algorithms.pdf
 
HTML and CSS in depth.pdf
HTML and CSS in depth.pdfHTML and CSS in depth.pdf
HTML and CSS in depth.pdf
 
Skills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noorSkills Development for Mobile Game and Application Project..Naiyan noor
Skills Development for Mobile Game and Application Project..Naiyan noor
 
English for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdfEnglish for Career Development Naiyan Noor.pdf
English for Career Development Naiyan Noor.pdf
 
Data Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdfData Visualization with Python.....Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdf
 
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdfDatabases and SQL for Data Science with Python...Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
 
Data Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdfData Science Methodology...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdf
 
Tools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdfTools for Data Science ...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdf
 
What is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdfWhat is Data Science? ... Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdf
 
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdfProgramming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
 
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdfHTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
 
Introduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdfIntroduction to Data Science Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdf
 
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
 
Social Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdfSocial Media Marketing powered by HP....Naiyan Noor.pdf
Social Media Marketing powered by HP....Naiyan Noor.pdf
 
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdfMotor Driving Training with Basic Maintenance. SEIP  ..Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
 
Web Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdfWeb Application Development using PHP and Laravel -Naiyan Noor .pdf
Web Application Development using PHP and Laravel -Naiyan Noor .pdf
 
Python Course Basic
Python Course BasicPython Course Basic
Python Course Basic
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
UQx ieltsx certificate | edX
UQx ieltsx certificate | edXUQx ieltsx certificate | edX
UQx ieltsx certificate | edX
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

Chapter 9 security