SlideShare a Scribd company logo
IPSecurity
IP Security..___...____...._____.....______...........
Functional Areas
Authentication Confidentiality Key Management
Applications of IP Security..___...___....____...........
Provide Secure
Connection Across
LAN
MAN
WAN
1
Applications of IP Security..___...___....____...........
Secure Remote Access
over the Internet
2
Applications of IP Security..___...___....____...........
Establish Extranet and
Intranet connectivity
3
Applications of IP Security..___...___....____...........
Enhancing Electronic
commerce security
4
Applications of IP Security..___...___....____...........
Router Applications Router Advertisement (new)
Router Advertisement (maintenances)
Not forged update
Benefits of IP Security..___..._____....______...........
• IPsec in Router
• IPsec in Firewall
• Its below transport layer, so no need to change existing security mechanism
• Transparent to End-user
• IPsec for individual users
IPSecirity Scenario
• Access control
• Connectionless integrity
• Data origin authentication
• Rejection of replayed packets
• Confidentiality (encryption)
• Limited traffic flow confidentiality
IP Security Architecture..___..._____...._____...........
• RFC 2401: An overview of security architecture
• RFC 2402: Packet Authentication Extension
• RFC 2406: Packet Encryption Extension
• RFC 2408: Key Management capabilities
Two security Header Extension
Encapsulating Security Payload
(ESP)
Authentication Header (AH)
services
Security Association…___...._____.....______...........
Security Association
A one-way relationship between sender & receiver
Uniquely identified by:
SA Parameters
Security Parameters Index (SPI) IP Destination Address Security Protocol Identifier
A bit string assigned to this
SA.
The address of the
destination endpoint
of the SA.
Indicates whether the
association is an AH or
ESP Security
Association.
Sequence Number Counter Sequence Counter Overflow
Anti-Replay WindowAH Information ESP Information
Lifetime of this Security AssociationIP Security Mode
Path MTU
Transport Mode…___....____.....______...........
• Provide protection for upper layer protocols. (TCP/UDP/ICMP)
• Used for end to end communication
• ESP
• Encrypts IP payload,
• Optionally authenticate IP Payload but not IP header
• AH
• Authenticate IP payload and selected portion of IP Header
Tunnel Mode…___......____........_______...........
• Provide protection for entire IP packet by encrypting the packet with AH/ESP and an additional IP header
• Tunnel mode could be used in Three different configuration.
• Gateway to Gateway
• One endpoint
• Third party Firewall
Tunnel Mode…___......____........_______...........
•Gateway to Gateway
Tunnel Mode…___......____........_______...........
•One End-Point
Tunnel Mode…___......____........_______...........
•Third Party Firewall
Authentication Header…__......___........_____...........
• Provides support for Data Integrity and Authentication
Ensures that modification to a packet content in transit is not possible.
Enables End-System to Authenticate the User or Application
Prevents Address Spoofing Attack
Guards against reply attack
Authentication Header…__......___........_____...........
Data integrity
Authentication
Reply Protection
MAC
Secret shared key
Sequence Number
Authentication Header…__......___........_____...........
Fields:
• Next Header: Identify the type of header immediately following this header
(could be TCP or UDP header, based on application)
• Payload Length: Length of authentication header in 32 bit word minus 2
• Reserved: For future use (set to 0)
• Security Parameter index: Identifies Security Association Rules
• Sequence Number: Monotonically increasing counter value(number of messages
Sent using the current SA)
• Authentication Data: Contains Integrity Check Value(ICV), Eg. MAC
Authentication Header…__......___........_____...........
Authentication Header…__......___........_____...........
ICV (Integrity Check Value)
• It’s a Message Authentication Code
• First 96 bits are used as MAC as it’s the default size for the
authentication data field.
• MAC is calculated over
• Immutable ip-header fields
• Predictable fields upon arrival at the endpoint.
• Mutable and unpredictable fields are set to Zero
• Authentication Header other than authentication data field.
• Entire upper level data
Internet header length
Source Address
Version
Authentication Header…__......___........_____...........
Immutable Fields Mutable but Predictable Fields
Destination Address
Mutable Fields that are Zeroed
Time to live and Header checksum
Flow Label
Authentication Header…__......___........_____...........
Anti-Reply Service
• Protects against Reply Attack
• Based on Sequence Number
• Sequence number cycle : 232 – 1
• When this limit is reached, negotiate new SA
• Inbound processing when a packet is received
Authentication Header…__......___........_____...........
Transport Mode
IP Header TCP Data
IP Header AH TCP Data
Authentication Header…__......___........_____...........
Tunnel Mode
IP Header TCP Data
New IP
Header
AH
Original IP
Header
TCP Data
Encapsulating Security Payload.....__......___..........
Fields:
• Next Header: Identify the type of header immediately following this header
(could be TCP or UDP header, based on application)
• Security Parameter index: Identifies Security Association Rules
• Sequence Number: Monotonically increasing counter value(number of messages
Sent using the current SA)
• Payload Data: Transport level data or IP packet
• Padding: 0-255 Bytes
• Pad Length: number of pad bytes
• Authentication Data: Contains Integrity Check Value(ICV)
Encapsulating Security Payload.....__......___..........
Encapsulating Security Payload.....__......___..........
Transport Mode
IP Header TCP Data
IP
Header
ESP TCP Data ESP Trailer
ESP
Authentication
Encrypted
Combining Security Association.....__......___..........
Individual SA can implement either the AH or ESP protocol but not both.
Some traffic flow require services provided by both AH & ESP
Security Association Bundle: It refers to a sequence of SAs through which traffic must be processed
to provide a desired set of IPSec services.
The SAs in a bundle may terminate at different or same end-points
Security Association Bundle
Transport Adjacency:
Refers to applying more than one security
protocol to the same IP packet, without
invoking tunneling.
Iterated tunneling:
Refers to the application of multiple layers of
security protocols effected through IP tunneling.
Each tunnel can originate or terminate at a
different IPSec site along the path.
Combining Security Association.....__......___..........
Transport Adjacency:
Combining Security Association.....__......___..........
Iterated tunneling:
Combining Security Association.....__......___..........
Iterated tunneling with different End Point:
Combining Security Association.....__......___..........
Case 1: Security is provided between end systems
Case 2: Security is provided only between Gateways
Case 3: Builds on Case 2 by adding end-to-end security
Case 4: Provides support for a remote host
Combining Security Association.....__......___..........
Combining Security Association.....__......___..........
Authentication Plus Confidentiality
Transport mode ESP:
Authentication and Encryption apply to the IP
payload,
IP header is not protected.
Tunnel mode ESP:
Applies to entire IP packet.
Possible Combinations:
a: AH in transport mode
b: ESP in transport mode
c: ESP followed by AH in transport mode
d: a, b, c inside an AH or ESP in tunnel mode
Key Management......_____.........______..........
Manual Automatic
Small
Static
environment
Every Where
Key Management......_____.........______..........
Oakley Key Determination Protocol
Refinement over Diffie-Hellman key exchange algorithm
Features:
Secret keys are created only when needed
Requires no pre-existing infracture
Weaknesses:
Doesn’t provide any info regarding identity of parties
Subject to man in the middle attack
Key Management......_____.........______..........
Man in the
Middle Attack
CloggingAttack
Key Management......_____.........______..........
Oakley
Features
Cookies to thwart clogging attack
Enables two parties to negotiate group
Use nonces to ensure against reply attack
Key Management......_____.........______..........
Oakley
Authentication Methods
Digital Signature
Public key Encryption
Symmetric key Encryption

More Related Content

What's hot

IP security
IP securityIP security
IP security
shraddha mane
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
Prateek Singh Bapna
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Ip security
Ip security Ip security
Ip security
Dr.K.Sreenivas Rao
 
Hash Function
Hash Function Hash Function
Hash Function
ssuserdfb2da
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana
 
Pgp
PgpPgp
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
Shashank Asthana
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 

What's hot (20)

IP security
IP securityIP security
IP security
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Ip security
Ip security Ip security
Ip security
 
Hash Function
Hash Function Hash Function
Hash Function
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
IP Security
IP SecurityIP Security
IP Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Pgp
PgpPgp
Pgp
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 

Similar to ip security

Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)maunicmer
 
Secure shell performance testing
Secure shell performance testingSecure shell performance testing
Secure shell performance testing
Sami Knuutinen
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
n|u - The Open Security Community
 
Crypto products backgrounder r0
Crypto products backgrounder r0Crypto products backgrounder r0
Crypto products backgrounder r0
Bill Boldt
 
Netop Remote Control Security Overview
Netop Remote Control Security OverviewNetop Remote Control Security Overview
Netop Remote Control Security Overview
Netop
 
IPsec vpn topology over GRE tunnels
IPsec vpn topology over GRE tunnelsIPsec vpn topology over GRE tunnels
IPsec vpn topology over GRE tunnels
Mustafa Khaleel
 
VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )Ahmed Al-Dabbagh
 
Using gsm sim authentication in vp ns
Using gsm sim authentication in vp nsUsing gsm sim authentication in vp ns
Using gsm sim authentication in vp ns
Jamal Meselmani
 
Intrusion Access Catalog August 09
Intrusion Access Catalog August 09Intrusion Access Catalog August 09
Intrusion Access Catalog August 09Alex McAllister
 
Networking principles protocols and practice
Networking principles protocols and practiceNetworking principles protocols and practice
Networking principles protocols and practice
DAVID RAUDALES
 
Improved kernel based port-knocking in linux
Improved kernel based port-knocking in linuxImproved kernel based port-knocking in linux
Improved kernel based port-knocking in linux
dinomasch
 
Comparative Analysis of Personal Firewalls
Comparative Analysis of Personal FirewallsComparative Analysis of Personal Firewalls
Comparative Analysis of Personal Firewalls
Andrej Šimko
 
Huong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco Router
Huong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco RouterHuong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco Router
Huong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco Routerntk241
 
Processing IoT Data with Apache Kafka
Processing IoT Data with Apache KafkaProcessing IoT Data with Apache Kafka
Processing IoT Data with Apache Kafka
Matthew Howlett
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
NamanRockzz
 
Networkin new
Networkin newNetworkin new
Networkin newrajujast
 
VoLTE and ViLTE.pdf
VoLTE and ViLTE.pdfVoLTE and ViLTE.pdf
VoLTE and ViLTE.pdf
AsitSwain5
 

Similar to ip security (20)

Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)
 
Secure shell performance testing
Secure shell performance testingSecure shell performance testing
Secure shell performance testing
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 
Crypto products backgrounder r0
Crypto products backgrounder r0Crypto products backgrounder r0
Crypto products backgrounder r0
 
H323 support.docx
H323 support.docxH323 support.docx
H323 support.docx
 
business
businessbusiness
business
 
Netop Remote Control Security Overview
Netop Remote Control Security OverviewNetop Remote Control Security Overview
Netop Remote Control Security Overview
 
IPsec vpn topology over GRE tunnels
IPsec vpn topology over GRE tunnelsIPsec vpn topology over GRE tunnels
IPsec vpn topology over GRE tunnels
 
VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )VoIP GP ( Updated with Int )
VoIP GP ( Updated with Int )
 
Using gsm sim authentication in vp ns
Using gsm sim authentication in vp nsUsing gsm sim authentication in vp ns
Using gsm sim authentication in vp ns
 
Intrusion Access Catalog August 09
Intrusion Access Catalog August 09Intrusion Access Catalog August 09
Intrusion Access Catalog August 09
 
Networking principles protocols and practice
Networking principles protocols and practiceNetworking principles protocols and practice
Networking principles protocols and practice
 
Improved kernel based port-knocking in linux
Improved kernel based port-knocking in linuxImproved kernel based port-knocking in linux
Improved kernel based port-knocking in linux
 
thesis_template
thesis_templatethesis_template
thesis_template
 
Comparative Analysis of Personal Firewalls
Comparative Analysis of Personal FirewallsComparative Analysis of Personal Firewalls
Comparative Analysis of Personal Firewalls
 
Huong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco Router
Huong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco RouterHuong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco Router
Huong Dan Cau Hinh Cac Tinh Nang Co Ban Cho Cisco Router
 
Processing IoT Data with Apache Kafka
Processing IoT Data with Apache KafkaProcessing IoT Data with Apache Kafka
Processing IoT Data with Apache Kafka
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 
Networkin new
Networkin newNetworkin new
Networkin new
 
VoLTE and ViLTE.pdf
VoLTE and ViLTE.pdfVoLTE and ViLTE.pdf
VoLTE and ViLTE.pdf
 

Recently uploaded

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 

Recently uploaded (20)

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 

ip security