The document provides an introduction to CSS (Cascading Style Sheets) and how it is used to style HTML documents. Some key points:
- CSS allows formatting and styling of HTML elements like colors, fonts, spacing, etc. CSS works with HTML and styles are defined in a separate CSS file.
- HTML elements are marked with IDs and classes that are defined in the CSS file. IDs are unique, classes are not. This is how CSS knows which styles to apply to which elements.
- A CSS file defines the styles for each ID, class, and element used in the HTML. Styles include properties like color, font, size, alignment, etc.
- For a
CSS (Cascading Style Sheets) allows formatting and styling to be added to HTML pages. CSS works with HTML by linking CSS files to HTML documents. HTML elements are then styled by CSS using IDs, classes, or element types. IDs uniquely identify single elements, while classes can style multiple similar elements. A CSS file defines styles for each ID, class, and element used in HTML pages. Styles include things like colors, fonts, borders, and positioning. This allows full control over a website's visual design and layout.
This document provides an introduction and overview of CSS (Cascading Style Sheets). It discusses what CSS is, its advantages, basic structure and syntax, applying styles using internal, external and inline styles, style precedence, and how to use IDs, classes, divs, spans and other selectors to control layout and formatting of text, links, backgrounds, fonts, lists and tables. The document covers many fundamental CSS concepts in a tutorial-like format.
Media queries allow CSS styles to be applied conditionally based on characteristics of the device viewing the content, like screen width. They provide a way to target specific devices and change layouts without changing the HTML. The document discusses the syntax of media queries, including using media types, features, expressions, and keywords. It provides examples of using media queries to load different style sheets or apply different CSS rules for different screen widths.
The document provides an introduction to CSS and SASS including definitions of HTML, CSS, CSS syntax, selectors, properties, and other CSS concepts. It defines HTML as a markup language and CSS as used to style and lay out HTML elements. It describes common CSS concepts like selectors, properties, values, and ways to attach CSS like inline, embedded and external stylesheets.
This document provides an overview of Cascading Style Sheets (CSS) including:
- The different ways to apply CSS such as inline styles, embedded styles, and external styles.
- Various CSS selectors like tag selectors, class selectors, ID selectors, and combination selectors that allow targeting specific elements.
- CSS properties for styling elements with regards to colors, text, margins, paddings, and borders.
- The benefits of using CSS including separation of structure and presentation, consistency across pages, and reduced file size compared to only using HTML for styling.
The document provides an overview of CSS (Cascading Style Sheets) methodology. It defines CSS as the language used for implementing designs on HTML documents. It then covers CSS basics including selectors, properties, conflicts resolution using specificity and cascade order. It also discusses the box model which defines how browsers handle rectangular boxes for elements. Finally, it offers some best practices tips such as resetting styles, separating content from design, and planning layout during HTML coding.
CSS (Cascading Style Sheets) allows formatting and styling to be added to HTML pages. CSS works with HTML by linking CSS files to HTML documents. HTML elements are then styled by CSS using IDs, classes, or element types. IDs uniquely identify single elements, while classes can style multiple similar elements. A CSS file defines styles for each ID, class, and element used in HTML pages. Styles include things like colors, fonts, borders, and positioning. This allows full control over a website's visual design and layout.
This document provides an introduction and overview of CSS (Cascading Style Sheets). It discusses what CSS is, its advantages, basic structure and syntax, applying styles using internal, external and inline styles, style precedence, and how to use IDs, classes, divs, spans and other selectors to control layout and formatting of text, links, backgrounds, fonts, lists and tables. The document covers many fundamental CSS concepts in a tutorial-like format.
Media queries allow CSS styles to be applied conditionally based on characteristics of the device viewing the content, like screen width. They provide a way to target specific devices and change layouts without changing the HTML. The document discusses the syntax of media queries, including using media types, features, expressions, and keywords. It provides examples of using media queries to load different style sheets or apply different CSS rules for different screen widths.
The document provides an introduction to CSS and SASS including definitions of HTML, CSS, CSS syntax, selectors, properties, and other CSS concepts. It defines HTML as a markup language and CSS as used to style and lay out HTML elements. It describes common CSS concepts like selectors, properties, values, and ways to attach CSS like inline, embedded and external stylesheets.
This document provides an overview of Cascading Style Sheets (CSS) including:
- The different ways to apply CSS such as inline styles, embedded styles, and external styles.
- Various CSS selectors like tag selectors, class selectors, ID selectors, and combination selectors that allow targeting specific elements.
- CSS properties for styling elements with regards to colors, text, margins, paddings, and borders.
- The benefits of using CSS including separation of structure and presentation, consistency across pages, and reduced file size compared to only using HTML for styling.
The document provides an overview of CSS (Cascading Style Sheets) methodology. It defines CSS as the language used for implementing designs on HTML documents. It then covers CSS basics including selectors, properties, conflicts resolution using specificity and cascade order. It also discusses the box model which defines how browsers handle rectangular boxes for elements. Finally, it offers some best practices tips such as resetting styles, separating content from design, and planning layout during HTML coding.
The document discusses various topics in CSS3 including selectors, properties, media queries, and visual effects. It provides examples and explanations of CSS3 concepts like gradients, rounded corners, box shadow, text shadow, opacity, and more. Browser support and cross-browser compatibility of CSS3 features are also covered.
CSS is used to style and lay out web pages. It allows separation of document content from page layout and design. CSS rules contain selectors that specify the elements to style and properties that define the styles. Common properties include font, color, background, borders, margin and padding. CSS rules can be defined internally, in a linked stylesheet, or inline in HTML elements. CSS provides control over text, font, color, spacing and layout to present content attractively and consistently across multiple browsers and devices.
Recent implementation of CSS3 features in modern browsers allow for greater design control and creativity in our Web sites.
In this three-hour workshop, attendees will learn about using colors through RGBa and opacity, multiple background and border images, text and box shadows, CSS-enabled gradients and transitions as well as laying out text in multiple columns.
In addition to font embedding techniques and third-party font bureaus, we look into designing with older browsers in mind when coding with CSS3.
The document discusses an agenda for a class on CSS (Cascading Style Sheets). The agenda includes learning what CSS is and its importance, understanding CSS grammar and syntax, linking a CSS file to HTML, creating a designer's toolbox, designing a basic webpage with CSS, and commenting in CSS. It also provides examples of CSS code, instructions on adding CSS to HTML pages, and homework of creating a basic webpage and CSS file.
CSS3 isn't the future, it's the present. Learn the gamut of CSS3 properties from colors, web fonts, and visual effects, to transitions, animations and media queries. Find the inspiration and resources to go forth and implement the new properties with confidence.
CSS is used to style and lay out web pages. It allows separation of document content from page layout and design. CSS declarations are made up of selectors and properties. Selectors identify elements on the page and properties set specific styles for those elements, like color, font, size, and layout. CSS rules cascade based on specificity and source, with more specific and inline rules taking precedence over broader and external rules. Inheritance passes down text-based styles by default.
CSS3 is an update to the CSS2.1 specification that introduces many new features and modules. Some key CSS3 modules include selectors, backgrounds and borders, text effects, transformations, transitions, multiple columns, and user interface. CSS3 allows for rounded borders using border-radius, box shadows using box-shadow, and image borders using border-image. Other CSS3 properties include text-shadow, word-wrap, transforms like rotate and scale, transitions for animated effects, multiple columns layout, and user interface features like resizing and outlines. Support for CSS3 varies across browsers.
This document summarizes a knowledge sharing session on HTML and CSS basics. It covers topics like HTML tags and structures, CSS rules and selectors, the CSS box model, positioning, sprites, and hacks for dealing with browser inconsistencies. The session introduced fundamental concepts for using HTML to structure content and CSS for styling and layout, providing examples for common tags, selectors, properties and techniques. It aimed to give attendees an overview of the core building blocks of HTML and CSS.
This document provides an introduction to CSS (Cascading Style Sheets), covering topics such as:
- What CSS is and why it's used
- How to reference a CSS stylesheet from an HTML document
- CSS syntax including selectors, properties, and values
- Common CSS tags, properties, and positioning techniques
- Tools for inspecting and debugging CSS
SASS (Syntactically Awesome StyleSheets) is a CSS pre-processor that allows for nested rules, variables, mixins and more to extend the functionality of CSS. It compiles into regular CSS. Key features include nesting rules to reduce repetition, using variables to define common values for reuse, and creating mixins for commonly used CSS patterns or properties. SASS also allows for logic and functions. COMPASS is an open-source framework built on SASS that provides pre-made mixins and modules for common CSS patterns to simplify development.
This document provides an overview of CSS (Cascading Style Sheets), including what CSS is, how it separates presentation from content, the history of CSS, sources of styles, selectors, properties, values, and positioning. CSS allows control over font, color, spacing, size, and positioning of elements to change how HTML content is displayed. CSS properties include display, visibility, float, clear, position, and box model properties that affect layout and appearance.
This document provides an overview of CSS3 features including borders, backgrounds, text effects, fonts, transforms, transitions, animations, multiple columns, and selectors. It begins with an introduction to CSS3 and what it adds compared to CSS2. It then covers specific CSS3 modules like borders, backgrounds, text effects and how to create various visual effects. It demonstrates how to use CSS3 features like rounded borders, multiple backgrounds, shadows, fonts, 2D and 3D transforms, transitions and animations. The document also covers CSS3 multiple column layouts, and new selector types introduced in CSS3.
Cascading Style Sheets (CSS) is used to format and lay out web documents. CSS works with HTML and JavaScript. CSS uses rules and selectors to style elements by changing properties like colors, sizes, and positioning. A style sheet contains rules with selectors that match HTML tags and attributes. The declaration block then sets property values. Common properties include width, background color, text alignment, and borders. Selectors target elements by type, ID, class, and placement. Examples demonstrate styling navigation bars and clouds. The presentation concludes with a Q&A.
Introduction to the styling language of the Web - CSS and learn its foundations. We will cover CSS syntax, how to add CSS to your HTML, various CSS properties, the box model, CSS units and custom properties. Understand how to use CSS to style individual elements and create layouts with an example of a styling the landing page of a portfolio.
Extended slides from a recent Sydney Port80 presentation. The slides cover three overall topics: 1) a quick timeline of CSS-related events, 2) key events that changed CSS and 3) a discussion on writing better CSS.
This is the CSS Tutorial for Beginners that teach the basics of CSS. This tutorial will show the basic structure of a CSS style and will show 3 different methods to apply styles.
This document provides an introduction to CSS (Cascading Style Sheets) including what CSS is, where it can be used, CSS syntax, and key concepts like inheritance and the cascade. CSS is used to style and lay out HTML elements on a page. It allows customizing elements with properties like color, font, size and more. CSS can be included inline with HTML, embedded in the HTML <head> with <style> tags, or linked externally in a .css file. The cascade determines which styles take precedence when multiple selectors apply to the same element. Inheritance applies styles to descendant elements.
1) The document introduces CSS (Cascading Style Sheets) and discusses how it is used to separate HTML content from presentation through external style sheets, embedded styles, and inline styles.
2) It covers basic CSS syntax including selectors, declarations, properties, and values. Common text-related properties like font, color, size, and alignment are described.
3) The "cascade" of CSS is explained, with browser, user, and author styles having different levels of precedence based on specificity and importance. This determines which styles will apply when conflicts occur.
The document provides an introduction to CSS (Cascading Style Sheets) including the different methods for linking an external CSS stylesheet (internal, external, inline). It describes CSS syntax using selectors, properties, and values to style HTML elements. Specific CSS properties like margins, padding, and classes/IDs are defined. The document is a tutorial that teaches CSS basics through examples to style text formatting, layout, and design elements of a webpage.
The document discusses various topics in CSS3 including selectors, properties, media queries, and visual effects. It provides examples and explanations of CSS3 concepts like gradients, rounded corners, box shadow, text shadow, opacity, and more. Browser support and cross-browser compatibility of CSS3 features are also covered.
CSS is used to style and lay out web pages. It allows separation of document content from page layout and design. CSS rules contain selectors that specify the elements to style and properties that define the styles. Common properties include font, color, background, borders, margin and padding. CSS rules can be defined internally, in a linked stylesheet, or inline in HTML elements. CSS provides control over text, font, color, spacing and layout to present content attractively and consistently across multiple browsers and devices.
Recent implementation of CSS3 features in modern browsers allow for greater design control and creativity in our Web sites.
In this three-hour workshop, attendees will learn about using colors through RGBa and opacity, multiple background and border images, text and box shadows, CSS-enabled gradients and transitions as well as laying out text in multiple columns.
In addition to font embedding techniques and third-party font bureaus, we look into designing with older browsers in mind when coding with CSS3.
The document discusses an agenda for a class on CSS (Cascading Style Sheets). The agenda includes learning what CSS is and its importance, understanding CSS grammar and syntax, linking a CSS file to HTML, creating a designer's toolbox, designing a basic webpage with CSS, and commenting in CSS. It also provides examples of CSS code, instructions on adding CSS to HTML pages, and homework of creating a basic webpage and CSS file.
CSS3 isn't the future, it's the present. Learn the gamut of CSS3 properties from colors, web fonts, and visual effects, to transitions, animations and media queries. Find the inspiration and resources to go forth and implement the new properties with confidence.
CSS is used to style and lay out web pages. It allows separation of document content from page layout and design. CSS declarations are made up of selectors and properties. Selectors identify elements on the page and properties set specific styles for those elements, like color, font, size, and layout. CSS rules cascade based on specificity and source, with more specific and inline rules taking precedence over broader and external rules. Inheritance passes down text-based styles by default.
CSS3 is an update to the CSS2.1 specification that introduces many new features and modules. Some key CSS3 modules include selectors, backgrounds and borders, text effects, transformations, transitions, multiple columns, and user interface. CSS3 allows for rounded borders using border-radius, box shadows using box-shadow, and image borders using border-image. Other CSS3 properties include text-shadow, word-wrap, transforms like rotate and scale, transitions for animated effects, multiple columns layout, and user interface features like resizing and outlines. Support for CSS3 varies across browsers.
This document summarizes a knowledge sharing session on HTML and CSS basics. It covers topics like HTML tags and structures, CSS rules and selectors, the CSS box model, positioning, sprites, and hacks for dealing with browser inconsistencies. The session introduced fundamental concepts for using HTML to structure content and CSS for styling and layout, providing examples for common tags, selectors, properties and techniques. It aimed to give attendees an overview of the core building blocks of HTML and CSS.
This document provides an introduction to CSS (Cascading Style Sheets), covering topics such as:
- What CSS is and why it's used
- How to reference a CSS stylesheet from an HTML document
- CSS syntax including selectors, properties, and values
- Common CSS tags, properties, and positioning techniques
- Tools for inspecting and debugging CSS
SASS (Syntactically Awesome StyleSheets) is a CSS pre-processor that allows for nested rules, variables, mixins and more to extend the functionality of CSS. It compiles into regular CSS. Key features include nesting rules to reduce repetition, using variables to define common values for reuse, and creating mixins for commonly used CSS patterns or properties. SASS also allows for logic and functions. COMPASS is an open-source framework built on SASS that provides pre-made mixins and modules for common CSS patterns to simplify development.
This document provides an overview of CSS (Cascading Style Sheets), including what CSS is, how it separates presentation from content, the history of CSS, sources of styles, selectors, properties, values, and positioning. CSS allows control over font, color, spacing, size, and positioning of elements to change how HTML content is displayed. CSS properties include display, visibility, float, clear, position, and box model properties that affect layout and appearance.
This document provides an overview of CSS3 features including borders, backgrounds, text effects, fonts, transforms, transitions, animations, multiple columns, and selectors. It begins with an introduction to CSS3 and what it adds compared to CSS2. It then covers specific CSS3 modules like borders, backgrounds, text effects and how to create various visual effects. It demonstrates how to use CSS3 features like rounded borders, multiple backgrounds, shadows, fonts, 2D and 3D transforms, transitions and animations. The document also covers CSS3 multiple column layouts, and new selector types introduced in CSS3.
Cascading Style Sheets (CSS) is used to format and lay out web documents. CSS works with HTML and JavaScript. CSS uses rules and selectors to style elements by changing properties like colors, sizes, and positioning. A style sheet contains rules with selectors that match HTML tags and attributes. The declaration block then sets property values. Common properties include width, background color, text alignment, and borders. Selectors target elements by type, ID, class, and placement. Examples demonstrate styling navigation bars and clouds. The presentation concludes with a Q&A.
Introduction to the styling language of the Web - CSS and learn its foundations. We will cover CSS syntax, how to add CSS to your HTML, various CSS properties, the box model, CSS units and custom properties. Understand how to use CSS to style individual elements and create layouts with an example of a styling the landing page of a portfolio.
Extended slides from a recent Sydney Port80 presentation. The slides cover three overall topics: 1) a quick timeline of CSS-related events, 2) key events that changed CSS and 3) a discussion on writing better CSS.
This is the CSS Tutorial for Beginners that teach the basics of CSS. This tutorial will show the basic structure of a CSS style and will show 3 different methods to apply styles.
This document provides an introduction to CSS (Cascading Style Sheets) including what CSS is, where it can be used, CSS syntax, and key concepts like inheritance and the cascade. CSS is used to style and lay out HTML elements on a page. It allows customizing elements with properties like color, font, size and more. CSS can be included inline with HTML, embedded in the HTML <head> with <style> tags, or linked externally in a .css file. The cascade determines which styles take precedence when multiple selectors apply to the same element. Inheritance applies styles to descendant elements.
1) The document introduces CSS (Cascading Style Sheets) and discusses how it is used to separate HTML content from presentation through external style sheets, embedded styles, and inline styles.
2) It covers basic CSS syntax including selectors, declarations, properties, and values. Common text-related properties like font, color, size, and alignment are described.
3) The "cascade" of CSS is explained, with browser, user, and author styles having different levels of precedence based on specificity and importance. This determines which styles will apply when conflicts occur.
The document provides an introduction to CSS (Cascading Style Sheets) including the different methods for linking an external CSS stylesheet (internal, external, inline). It describes CSS syntax using selectors, properties, and values to style HTML elements. Specific CSS properties like margins, padding, and classes/IDs are defined. The document is a tutorial that teaches CSS basics through examples to style text formatting, layout, and design elements of a webpage.
Cascading Style Sheets (CSS) is used to describe the presentation of HTML documents including defining sizes, spacing, fonts, colors, layout, etc. CSS separates presentation from content to improve accessibility, flexibility and reusability. There are different ways to apply CSS including inline styles within HTML elements, internal styles within the <style> tag, and external stylesheets linked via the <link> tag. Key benefits of CSS include faster page loads, increased accessibility, and easier maintenance of page styling across many pages by changing a single CSS file.
This document discusses basic CSS layout and properties. It explains how to use class and ID selectors to style specific elements on a page. It also describes the differences between internal, external, and inline CSS styles. Finally, it covers the main CSS background properties including background-color, background-image, background-repeat, and background-position that control the aesthetics of a website.
This document provides an overview of CSS (Cascading Style Sheets) for web development. It defines CSS as a simple design language that separates the structure of HTML elements from their presentation. The document then covers the advantages of CSS, CSS syntax using selectors, properties, and values, examples of inline, embedded, external, and imported CSS, and different types of CSS selectors. It aims to simplify the process of making web pages presentable using CSS.
This document introduces CSS (Cascading Style Sheets) and provides examples of how to use CSS to style HTML elements. CSS allows separation of document structure (HTML) from presentation (CSS). There are three ways to associate CSS with HTML - external CSS files linked via <link>, internal <style> sections, or inline styles via the style attribute. CSS selectors target elements by tag name, class, ID, or context. Classes and IDs allow targeting groups or individual elements. CSS rules define styles using properties and values within curly braces. This allows consistent styling across pages by changing a single CSS file.
Cordova training - Day 2 Introduction to CSS 3Binu Paul
This document provides an introduction to CSS3 and its key concepts. It discusses how CSS is used to control the style and presentation of HTML documents. The main topics covered include the advantages of CSS like time savings and easy maintenance, the different CSS modules, syntax involving selectors, properties and values, and how to include CSS through different methods. It also explains various CSS properties for styling text, backgrounds, borders, images and positioning elements.
The document covers various topics related to CSS including CSS introduction, syntax, selectors, inclusion methods, setting backgrounds, fonts, manipulating text, and working with images. Key points include how CSS handles web page styling, the advantages of CSS, CSS versions, associating styles using embedded, inline, external and imported CSS, and properties for backgrounds, fonts, text formatting, and images.
CSS (Cascading Style Sheets) is a language for styling and formatting web pages. It allows developers to control the layout and presentation of HTML documents, saving time by applying styles across multiple pages at once. CSS rules contain selectors that target HTML elements, properties that define what is styled, and values that determine how it is styled. There are three main ways to define CSS - inline, internal, and external stylesheets. External is considered best practice as it allows styling multiple pages with one CSS file. CSS selectors like ID, class, and pseudo-selectors are used to target specific elements for styling.
Css training tutorial css3 & css4 essentialsQA TrainingHub
Learn CSS - Cascading style Sheets to crate awsome looking for your general html Ui & Create responsive HTML Templates by understanding this css tutorial
This document provides an introduction to CSS (Cascading Style Sheets) through a series of lessons:
- Lesson 1 defines CSS and its history, purpose of separating formatting from content, and examples of how CSS changes page appearance without altering HTML.
- Lesson 2 explains CSS syntax including selectors, declarations, properties/values, and declaration blocks. Students create their first CSS page.
- Lesson 3 covers CSS class and ID selectors. Students create pages using class and ID selectors.
- Lesson 4 describes three methods to apply CSS - inline, internal, and external style sheets.
The document includes assignments for students to practice CSS concepts by modifying provided code examples.
Cascading Styling Sheets(CSS) simple design language intended to transform th...JebaRaj26
1.Inline CSS
2. Internal
3.External
Inline CSS: Inline CSS contains the CSS property in the body section attached to the element is known as inline CSS. This kind of style is specified within an HTML tag using the style attribute.
<html>
<head>
<title>Inline CSS</title>
</head>
<body>
<p style="color:#009900; font-size:50px;
font-style:italic; text-align:center;">
Nesamony Memorial Christian College
</p>
</body>
</html>
Internal or Embedded CSS: This can be used when a single HTML document must be styled uniquely. The CSS rule set should be within the HTML file in the head section i.e. the CSS is embedded within the <style> tag inside the head section of the HTML file.
<html>
<head>
<title>Internal CSS</title>
<style>
.main {
text-align: center;
}
.mca {
color: #009900;
font-size: 50px;
font-weight: bold;
}
.nmcc {
font-style: bold;
font-size: 20px;
}
</style>
</head>
External CSS: External CSS contains separate CSS files that contain only style properties with the help of tag attributes (For example class, id, heading, … etc).
CSS property is written in a separate file with a .css extension and should be linked to the HTML document using a link tag. It means that, for each element, style can be set only once and will be applied across web pages.
<html>
<head>
<link rel="stylesheet" href="geeks.css" />
</head>
<body>
<div class="main">
<div class=“mca">Department of Computer Science & Applications</div>
<div id=“nmcc">
Basics of Web Design
</div>
</div>
</body>
</html>
This document provides an overview of CSS (Cascading Style Sheets) including its history, basic syntax and structure, common properties that can be styled, and different methods for applying styles. Key points covered include using CSS to style fonts, colors, links, and page layout with properties like padding, margin, and floats. The document also demonstrates how to select elements with IDs, classes, and other selectors to style them.
This document discusses CSS positioning properties. It explains static positioning as the default normal flow layout. It describes float as removing an element from the flow and allowing other content to wrap around it. Relative positioning is defined as positioning an element relative to its static position, while fixed takes an element out of flow and positions it relative to the browser window. Absolute positioning positions an element relative to its first positioned ancestor, removing it from the flow. Examples are given for float, relative, fixed, and absolute. Class exercises provide opportunities to practice these positioning techniques.
CSS (Cascading Style Sheets) is used to style and lay out HTML elements. CSS can be added to HTML elements in three ways: inline, internally, or externally via a separate CSS file. A CSS rule consists of a selector that points to the HTML element to style and a declaration block containing CSS properties and values to apply styles like color, font, size, and layout. Common CSS selectors target elements by ID, class, element type, or other attributes. CSS can control text, font, color, size, spacing, borders, and layout of HTML elements and entire web pages.
This document provides an overview of CSS (Cascading Style Sheets) including what CSS is used for, different types of CSS selectors, and how to apply CSS styles. CSS is used to control the presentation and styling of HTML elements, allowing separation of design from content. There are three main ways to select and target CSS styles: element selectors for regular HTML tags, class selectors for any HTML element, and ID selectors for unique elements. CSS rules are made up of selectors, properties, and values. The order that CSS rules are defined is important due to the cascade.
Cascading Style Sheets (CSS) is a language for styling web pages that separates presentation from content. CSS handles the look and feel of a web page by controlling color, fonts, spacing, sizing, backgrounds, and other visual aspects. CSS provides powerful control over HTML elements while keeping web pages lightweight and load faster. CSS rules can be applied internally, inline, or externally through linked style sheets to globally style elements across multiple web pages. Common CSS properties control color, fonts, text, backgrounds, borders, positioning, and visual effects.
The document provides information on CSS (Cascading Style Sheets). It discusses the different types of style sheets including inline, internal/embedded, and external stylesheets. It also covers various CSS properties such as text formatting, borders, margins, positioning elements with classes, and color properties. CSS is used to define styles and layouts for HTML documents and makes web pages more presentable.
Similar to Internet tech & web prog. p4,5 (20)
The document discusses the development of cognitive systems and artificial intelligence. It provides an overview of IBM's Watson, a question answering computer system capable of answering questions posed in natural language. The document describes Watson's architecture which involves question analysis, hypothesis generation, evidence scoring, and synthesis to arrive at answers. It details how Watson was able to compete successfully on the game show Jeopardy and is now being developed to assist with medical applications.
This document discusses the future of artificial cognitive systems. It outlines several key topics including the main cognitive processes, the role of tacit knowledge in cognition, progress made in building cognitive systems, and potential architectures for cognitive systems. The document also discusses using spike neural networks for perception in cognitive systems and research into artificial consciousness systems. It provides examples of organizations researching cognitive computing and predicts continued advances that will require collaboration across academia, government and industry.
The document provides an overview of knowledge representation and logic. It discusses knowledge-based agents and how they use a knowledge base to represent facts about the world through sentences expressed in a knowledge representation language. It then covers different knowledge representation schemas including propositional logic, first-order logic, rules, networks, and structures. The document also discusses inference, different types of logic, and knowledge representation languages.
The document discusses various concepts related to state-space search problems and algorithms. It begins by introducing state-space representation and search trees, then describes concepts like search paths, costs, and strategies. It contrasts uninformed searches like breadth-first search which expand nodes by depth, with informed searches like A* that use heuristics. Breadth-first search is discussed in more detail, including that it expands the shallowest nodes first and adds generated states to the back of the queue.
1) Intelligent agents are systems that perceive their environment and act upon it. They can be designed to act or think rationally or humanly.
2) An agent is anything that can perceive its environment through sensors and act upon the environment through effectors. Agents perceive the environment via sensors and act with effectors, mapping percept sequences to actions.
3) Key properties of intelligent agents include autonomy, reactivity, proactiveness, balancing reactive and goal-oriented behavior, and social ability. Agents must be able to operate independently, respond to changes, pursue goals, and interact with other agents.
This document provides information about an Artificial Intelligence course. The key details are:
- The course is CSC 343, taught over 3 lecture hours and 2 lab hours
The document discusses image enhancement techniques in the frequency domain. It introduces Fourier transforms and how they can be used to represent images as a combination of different frequencies. Lowpass and highpass filtering techniques are described for smoothing or sharpening images by modifying specific frequency components. Filters like ideal, Butterworth, and Gaussian are covered. The summary applies filtering in the frequency domain to enhance images.
This document provides information about an image processing course. The key details are:
- The course number is CSC 447 and is taught over 3 lecture hours and 2 lab hours. It is worth 65 marks and has a 3 hour exam.
- The course covers topics like image processing applications, enhancement techniques, restoration, segmentation, and scene analysis. It also covers specific techniques like using neural networks and parallel algorithms for image processing.
- The textbook for the course is "Digital Image Processing Using Matlab" by Rafael Gonzalez and Richard Woods. There are 11 lab assignments focused on topics like image display, filtering, transforms, and color conversion using Matlab.
- The course is taught by
Verification and validation are processes to ensure a software system meets user needs. Verification checks that the product is being built correctly, while validation checks it is the right product. Both are life-cycle processes applying at each development stage. The goal is to discover defects and assess usability. Testing can be static like code analysis or dynamic by executing the product. Different testing types include unit, integration, system, and acceptance testing. An effective testing process involves planning test cases, executing them, and evaluating results.
1. The document discusses software design principles for the waterfall software process.
2. It outlines 11 design principles including dividing problems into smaller components, increasing cohesion, reducing coupling, keeping abstraction high, and designing for flexibility, reusability, portability, and defensiveness.
3. It also discusses design techniques like using priorities and objectives to evaluate alternatives and make design decisions.
The document discusses Unified Modeling Language (UML) diagrams, including state diagrams, sequence diagrams, and collaboration diagrams. It provides details on how to construct and interpret each type of diagram. State diagrams depict object states and transitions between states. Sequence diagrams show the messages passed between objects over time. Collaboration diagrams emphasize object relationships and indicate message sequences with numbers. Both sequence and collaboration diagrams can model the same interactions between objects.
This document discusses object-oriented concepts in software development. It describes the four main types of object-oriented paradigms used in the software lifecycle: object-oriented analysis, design, programming, and testing. It then explains some benefits of the object-oriented approach like modularity, reusability, and mapping to real-world entities. Key concepts like inheritance, encapsulation, and polymorphism are defined. The document also provides examples of how classes and objects are represented and compares procedural with object-oriented programming.
Requirements engineering involves analyzing user needs and constraints to define the services and limitations of a software system. It has several key steps:
1. Requirements analysis identifies stakeholders and understands requirements through client interviews to define both functional requirements about system services and non-functional constraints.
2. Requirements are documented in a requirements specification that defines what the system should do without describing how.
3. The document is validated through reviews and prototyping to ensure requirements accurately capture user needs before development begins.
The document discusses software project management. It states that project management is needed to ensure software is delivered on time, on budget, and according to requirements, as software development is constrained by schedules and budgets set by developing organizations. It describes key project management activities like establishing objectives and plans, assigning resources, tracking costs and progress, and recommending corrective actions. It also discusses challenges like inadequate resources, unrealistic deadlines, unclear goals, and communication breakdowns that can cause projects to fail if not properly managed.
The document discusses software engineering processes used by Microsoft and others. It describes the basic steps in software development as requirements, design, implementation, testing, and maintenance. Two common process models are described: the sequential waterfall model and iterative spiral model. The waterfall model has disadvantages because later stages often require revisions to earlier stages. Most modified versions of the waterfall model allow some iteration and feedback between stages. The spiral model iterates through requirements, design, implementation, and evaluation in cycles to refine the software. The document also briefly discusses other lifecycle models such as incremental development and extreme programming.
This document provides an overview of a software engineering course. The course objectives are to understand how to build complex software systems while dealing with change, produce high-quality software on time, and acquire both technical and managerial knowledge. The main topics covered include the software process, project management, system models, requirements analysis, design principles, verification and validation, testing techniques, and quality assurance. Recommended textbooks are also listed.
The document provides guidance on improving speech and writing styles, different types of letters, and cover letter formatting. It discusses writing formal versus informal letters and describes the standard paragraphs in a letter. Key elements of cover letters are outlined such as addressing the recipient, introductory and concluding paragraphs, highlighting relevant qualifications, and active versus vague language. Tips are given for effective writing, common phrases, and elements to avoid in cover letters. Sample cover letters and information on CVs/resumes and thank you letters are also included.
This document provides guidance on writing in plain language and proper document formatting. It discusses using shorter words and sentences, everyday language, and placing words carefully for clarity. Abbreviations, acronyms, punctuation and paragraph structure are also outlined. The goal is to make information easy to understand by matching the reading level of the intended audience.
This document provides guidance on formatting and structuring technical reports. It recommends numbering sections and paragraphs to make it easy for readers to provide feedback. It also emphasizes including figures, tables, equations and appendices to effectively communicate information, and using consistent formatting of headings, fonts, and styles. Finally, it advises going through multiple revisions to improve accuracy, clarity, organization, conciseness, and correct errors before finalizing the report.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
Internet tech & web prog. p4,5
1. Course Title :
Internet Techniques & Web programming
Course Code: CSC 357
PART : 4
Prof. Taymoor Mohamed Nazmy
Dept. of computer science, faculty of computer science, Ain Shams uni.
Ex-vice dean of post graduate studies and research Cairo, Egypt
2. What is CSS?
• CSS (Cascading Style Sheets) allows us to apply
formatting and styling to the HTML that builds
our web pages.
• CSS can control many elements of our web
pages: colors, fonts, alignment, borders,
backgrounds, spacing, margins, and much
more.
3. How does CSS work?
• CSS works in conjunction with HTML.
• An HTML file (or multiple files) links to a CSS file (or
multiple CSS files) and when the web browser displays the
page, it references the CSS file(s) to determine how to
display the content.
• HTML elements are marked with “IDs” and “classes,” which
are defined in the CSS file – this is how the browser knows
which styles belong where. Each element type (<h1>,
<img>, <p>, <li>, etc.) can also be styled with CSS.
– IDs and classes are defined by the person writing the code –
there are no default IDs and classes.
4. What is the difference between ID and
class?
• IDs and classes function the same way – they can both
provide the same styling functionality to an HTML element,
however…
– IDs are unique; each element can only have one ID, and that ID
can only be on the page once.
– Classes are not unique; an element can have multiple classes,
and multiple elements can have the same class.
• What does that mean?
– IDs can be used to style elements that are different from
anything else on the page.
– Classes can be used to style multiple elements on a single page
that have things in common, like font size, color, or style.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17. What does a CSS file look like?
• The styles for each element, ID, or class used on
an HTML page are defined in a CSS document.
#title { }
Classes are declared with a period and the class name; styles for the class
are wrapped with curly brackets:
.bodytext { }
IDs are declared with a pound sign and the ID name; styles for the ID are
wrapped with curly brackets:
Elements are declared with the element (HTML) tag; styles for the
element are wrapped with curly brackets:
h1 { }
18. What does a CSS file look like?
• Within each CSS element, styles are added
that apply to that particular element/ID/class:
h1 {
color: green;
}
This style would apply to anything within HTML <h1></h1>
tags; the text inside the tags would be green.
19. Adding CSS to HTML
• CSS must be used in conjunction with HTML to
be effective. CSS files can be linked to HTML
documents with a bit of code in the
<head></head> tags of an HTML file:
<link rel="stylesheet" type="text/css" href=“myfile.css" />
CSS can also be written “in line,” within HTML code, but
it’s preferable to include an external style sheet:
<p style=“font-size: 14px;”>Lorem ipsum…</p>
20. Let’s write some CSS!
• We’ll work in a web-based editing tool, but CSS can
easily be written in text editing software like
Notepad.
• Go to http://dabblet.com/gist/9103656
– *This tool references our CSS automatically, so in this case, we don’t
need to link our CSS file like we normally would.
21. Adding IDs and Classes to HTML
• First, we need to add our IDs and classes to the HTML:
<h1>Wolverine</h1>
<img
src=http://www.uvu.edu/web/images/wolverine.jpg
class=“bordered” />
This class won’t do
anything yet. We’ll
define its associated
styles in our CSS file.
22. Adding IDs and Classes to HTML
<p id="introduction" class="emphasis">The
wolverine, also referred to as glutton, carcajou,
skunk bear, or quickhatch…
<p class="emphasis">The adult wolverine is
about the size of a medium dog, with a length
usually ranging from…
…
We’re adding a class and an ID
to this paragraph; we want the
styles from both to be applied
to it.We only want the styles
from one class to apply
to this paragraph.
23. Defining Elements in CSS
• We’ve added IDs and classes to our HTML file,
but we need to define what those IDs and
classes will do.
– How will each class or ID change the appearance
of that HTML element?
• This is where CSS comes in!
– By defining the styles that go with each
attribute/class/ID, we have complete control over
the look of our content.
24. Writing CSS
• Let’s create a new CSS document in Notepad.
• We’ll begin by defining the “bordered” class that is
applied to one of the images.
– CSS uses . to identify classes, and # to identify IDs. Because
our HTML indicates class=“bordered” we need to use the
matching identifier in our CSS document.
.bordered { }
All the styles inside these brackets will be applied to any
elements in our HTML file that include class=“bordered”.
25. Writing CSS
• First, let’s add a simple style to .bordered:
.bordered {
width: 300px;
}
Each style ends with a
semicolon.
Now, any HTML element that includes class=“border” will be
300 pixels wide.
26. Writing CSS
• Let’s add a border to that image that has class=“bordered”.
– The “border” style requires some additional attributes.
.bordered {
width: 300px;
border: 3px solid #000000;
}
Tells the browser “I
want a border around
this element.”
The border
should be 3
pixels wide.
The border
should be solid.
(Other possible
values include
dotted and dashed.)
The border should
be black (defined
by hexadecimal
color code).
27. Using Colors in CSS
• Though there are standard color names that are supported
by all browsers (i.e. green, red, yellow, etc.), colors are
often declared in CSS using hexadecimal color codes.
• How can I find the hex color code?
Color picker tool in Photoshop/image
editing software.
Online tools:
http://www.w3schools.com/tags/ref_colorpicker.asp
Official UVU web colors:
http://www.uvu.edu/web/standards/
28. Writing CSS
• We want the image to be on the right side of the page,
so we need to add a “float” to the class styles:
.bordered {
width: 300px;
border: 1px solid #000;
float: right;
}
We could also align the element
to the left side of the page using
“float: left;”.
29. Writing CSS
• Next, let’s write some styles to apply to our
paragraphs. First, we’ll create styles for the ID called
“introduction.”
• We want this paragraph to stand out from the rest, so
we’ll make the font size bigger and change the color.
#introduction {
font-size: 20px;
color: #4d7123;
}
30. Writing CSS
• We want a few paragraphs to have some
additional emphasis, so let’s write an additional
class for those styles:
.emphasis {
font-style: italic;
font-weight: bold;
}
Other font-style options
include “underline,” and
“normal.”
Other font-weight options
include “normal,” “lighter,” or
numerical values.
31. Writing CSS
• We can also apply CSS styles to HTML elements
without using classes and IDs. These will apply to
any HTML element of that type, unless they are
overwritten by classes or IDs.
h1 {
font-family: “Arial”, sans-serif;
}
Any <h1> tag on the page will
be in Arial unless the <h1>
has a class that overwrites it.
32. Using Fonts in CSS
• Because every computer has a different set of fonts installed by
default, we can’t know for sure if our visitors will have a certain font
on their computer.
– If we design our site using a certain font, and a visitor doesn’t have
that font installed, our site will not look as we intended it to.
• Luckily, there is a set of “web safe” fonts that most computers have.
Choosing from these fonts will make our site look (almost) the same
on any computer.
• Web safe fonts include: Times New Roman, Georgia, Arial, Tahoma,
Verdana. More info:
http://www.w3schools.com/cssref/css_websafe_fonts.asp
– In CSS, the font-family style often includes a list of a few fonts, so that
there is a “fallback” option in case the font we specify first isn’t
available.
33. Writing CSS
• We may want the same styles to apply to more than
one element in our site. Combining our styles can help
us do this so that we don’t have to duplicate our CSS
code:
h1, h2 {
font-family: “Arial”, sans-serif;
}
Adding additional, comma-
separated elements, classes, or
IDs allows the same styles to be
used in more than one place.
34. More about CSS
• The possibilities with CSS are endless…this is just
scratching the surface
– CSS can: add rollover effects to text and images,
change background colors and images, create very
intricate page layouts and designs, change element
opacity, create gradient colors, control page layout in
adaptive/responsive design (new uvu.edu mobile-
friendly design), show and hide content, create
animations, and much more!
• A nice CSS “cheat sheet” is available at
http://www.w3schools.com/cssref/
• Find more CSS tutorials at
http://www.uvu.edu/web/training/basics.html
35. Embedded Styles: Example (2)
35
…
<body>
<h1 class="blue">A Heading</h1>
<p>Here is some text. Here is some text. Here
is some text. Here is some text. Here is some
text.</p>
<h1>Another Heading</h1>
<p class="blue">Here is some more text.
Here is some more text.</p>
<p class="blue">Here is some <em>more</em>
text. Here is some more text.</p>
</body>
</html>
36. …
<body>
<h1 class="blue">A Heading</h1>
<p>Here is some text. Here is some text. Here
is some text. Here is some text. Here is some
text.</p>
<h1>Another Heading</h1>
<p class="blue">Here is some more text.
Here is some more text.</p>
<p class="blue">Here is some <em>more</em>
text. Here is some more text.</p>
</body>
</html>
Embedded Styles: Example (3)
36
39. 39
What is XHTML?
• XHTML stands for Extensible Hypertext Markup
Language
– XHTML is aimed to replace HTML
– XHTML is almost identical to HTML 4.01
– XHTML is a stricter and cleaner version of HTML
• XML (Extensible Markup Language) is a markup
language designed for describing data
– XHTML is HTML redefined as an XML application
– XHTML is a “bridge” between HTML and XML
40. 40
The problem with HTML
• HTML started out as a way of way of describing
the structure of documents, with tags to indicate
headers, paragraphs, and the like
• Because people wanted to control the
appearance of documents, HTML acquired tags
to control fonts, alignment, etc.
• The result is a markup language that does both,
but isn’t very good at either
41. Introduction to XML
41
• XML stands for EXtensible Markup Language
• XML is a markup language much like HTML
• XML was designed to carry data, not to display
data
• XML tags are not predefined. You must define
your own tags
• XML is designed to be self-descriptive
• XML is a W3C Recommendation
42. XML is Not a Replacement for HTML
42
• It is important to understand that XML is not a
replacement for HTML. In most web
applications, XML is used to transport data,
while HTML is used to format and display the
data.
43. With XML You Invent Your Own Tags
43
• The tags used in HTML are predefined. HTML
documents can only use tags defined in the
HTML standard (like <p>, <h1>, etc.).
• XML allows the author to define his/her own
tags and his/her own document structure.
44. XML Separates Data from HTML
44
If you need to display dynamic data in your HTML
document, it will take a lot of work to edit the HTML
each time the data changes.
With XML, data can be stored in separate XML files.
This way you can concentrate on using HTML/CSS for
display and layout, and be sure that changes in the
underlying data will not require any changes to the
HTML.
With a few lines of JavaScript code, you can read an
external XML file and update the data content of your
web page.
45. XML Simplifies Data Transport
45
• One of the most time-consuming challenges
for developers is to exchange data between
incompatible systems over the Internet.
• Exchanging data as XML greatly reduces this
complexity, since the data can be read by
different incompatible applications.
46. Course Title :
Internet Techniques & Web programming
Course Code: CSC 357
PART : 5
Prof. Taymoor Mohamed Nazmy
Dept. of computer science, faculty of computer science, Ain Shams uni.
Ex-vice dean of post graduate studies and research Cairo, Egypt
48. JavaScript Syntax
• The JavaScript syntax is similar to C# and Java
– Operators (+, *, =, !=, &&, ++, …)
– Variables (typeless)
– Conditional statements (if, else)
– Loops (for, while)
– Arrays (my_array[]) and associative arrays
(my_array['abc'])
– Functions (can return value)
– Function variables (like the C# delegates)
48
49. Data Types
• JavaScript data types:
– Numbers (integer, floating-point)
– Boolean (true / false)
• String type – string of characters
• Arrays
• Associative arrays (hash tables)
49
var myName = "You can use both single or double
quotes for strings";
var my_array = [1, 5.3, "aaa"];
var my_hash = {a:2, b:3, c:"text"};
50. Everything is Object
• Every variable can be considered as object
– For example strings and arrays have member
functions:
50
var test = "some string";
alert(test[7]); // shows letter 'r'
alert(test.charAt(5)); // shows letter 's'
alert("test".charAt(1)); //shows letter 'e'
alert("test".substring(1,3)); //shows 'es'
var arr = [1,3,4];
alert (arr.length); // shows 3
arr.push(7); // appends 7 to end of array
alert (arr[3]); // shows 7
objects.html
52. Arrays Operations and Properties
• Declaring new empty array:
• Declaring an array holding few elements:
• Appending an element / getting the last element:
• Reading the number of elements (array length):
• Finding element's index in the array:
52
var arr = new Array();
var arr = [1, 2, 3, 4, 5];
arr.push(3);
var element = arr.pop();
arr.length;
arr.indexOf(1);
53. Standard Popup Boxes
• Alert box with text and [OK] button
– Just a message shown in a dialog box:
• Confirmation box
– Contains text, [OK] button and [Cancel] button:
• Prompt box
– Contains text, input field with default value:
53
alert("Some text here");
confirm("Are you sure?");
prompt ("enter amount", 10);
54. Sum of Numbers – Example
sum-of-numbers.html
54
<html>
<head>
<title>JavaScript Demo</title>
<script type="text/javascript">
function calcSum() {
value1 =
parseInt(document.mainForm.textBox1.value);
value2 =
parseInt(document.mainForm.textBox2.value);
sum = value1 + value2;
document.mainForm.textBoxSum.value = sum;
}
</script>
</head>
57. Greater than
<=
Symbol Meaning
>
< Less than
>= Greater than or equal to
Less than or equal to
== Equal
!= Not equal
Conditional Statement (if)
57
unitPrice = 1.30;
if (quantity > 100) {
unitPrice = 1.20;
}
58. Conditional Statement (if) (2)
• The condition may be of Boolean or integer type:
58
var a = 0;
var b = true;
if (typeof(a)=="undefined" || typeof(b)=="undefined") {
document.write("Variable a or b is undefined.");
}
else if (!a && b) {
document.write("a==0; b==true;");
} else {
document.write("a==" + a + "; b==" + b + ";");
}
conditional-statements.html
59. Switch Statement
• The switch statement works like in C#:
59
switch (variable) {
case 1:
// do something
break;
case 'a':
// do something else
break;
case 3.14:
// another code
break;
default:
// something completely different
}
switch-statements.html
60. Loops
• Like in C#
• for loop
• while loop
• do … while loop
60
var counter;
for (counter=0; counter<4; counter++) {
alert(counter);
}
while (counter < 5) {
alert(++counter);
} loops.html
61. Functions
• Code structure – splitting code into parts
• Data comes in, processed, result returned
61
function average(a, b, c)
{
var total;
total = a+b+c;
return total/3;
}
Parameters come in
here.
Declaring variables
is optional. Type is
never declared.
Value returned
here.
62. Function Arguments
and Return Value
• Functions are not required to return a value
• When calling function it is not obligatory to
specify all of its arguments
– The function has access to all the arguments passed
via arguments array
62
function sum() {
var sum = 0;
for (var i = 0; i < arguments.length; i ++)
sum += parseInt(arguments[i]);
return sum;
}
alert(sum(1, 2, 4)); functions-demo.html
63. How is JavaScript different from
Java?
• The JavaScript programming language, developed by Netscape, Inc., is not
part of the Java platform.
• JavaScript does not create applets or stand-alone applications. In its most
common form, JavaScript resides inside HTML documents, and can
provide levels of interactivity to web pages that are not achievable with
simple HTML.
• Key differences between Java and JavaScript: Java is an OOP
programming language while Java Script is an OOP scripting language.
• Java creates applications that run in a virtual machine or browser while
JavaScript code is run on a browser only.
• Java code needs to be compiled while JavaScript code are all in text.
• They require different plug-ins.
66. Course Title :
Internet Techniques & Web programming
Course Code: CSC 357
PART : 5
Prof. Taymoor Mohamed Nazmy
Dept. of computer science, faculty of computer science, Ain Shams uni.
Ex-vice dean of post graduate studies and research Cairo, Egypt
68. TCP/IP
• First developed in the mid-1970s, by Defense
Advanced Research Projects Agency (DARPA)
– establishing a packet-switched network that would facilitate
communication between dissimilar computer systems at
research institutions
–
• The foundation on which the Internet and the World
Wide Web (WWW) are based.
69. Internet Protocol (IP)
• The Internet Protocol (IP) is a network-layer (Layer 3)
protocol that contains addressing information and some control
information that enables packets to be routed
• IP represents the heart of the Internet protocols.
• IP has two primary responsibilities:
– providing connectionless, best-effort delivery of datagrams through an
internetwork
– providing fragmentation and reassembly of datagrams to support data
links with different maximum-transmission unit (MTU) sizes
70. Transmission Control Protocol (TCP)
• Provides reliable transmission of data in an IP
environment.
• Services TCP provides
– Stream data transfer
• TCP delivers an unstructured stream of bytes identified by
sequence numbers
• TCP groups bytes into segments and passes them to IP for delivery.
– Reliability
• Providing connection-oriented, end-to-end reliable packet delivery
71. Internet Protocols Application-Layer Protocols
• The Internet protocol suite includes many application-layer
protocols that represent a wide variety of applications,
including the following:
– File Transfer Protocol (FTP)-Moves files between devices
– Simple Network-Management Protocol (SNMP)-Primarily
reports anomalous network conditions and sets network
threshold values
– Telnet-Serves as a terminal emulation protocol
– X Windows-Serves as a distributed windowing and graphics
system used for communication between X terminals and UNIX
workstations
72. Internet protocol suite
• The Internet protocol suite is the conceptual
model and set of communications protocols used on
the Internet and similar computer networks. It is
commonly known as TCP/IP because the original
protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP).
• The Internet protocol suite provides end-to-end data
communication specifying how data should be
packetized, addressed, transmitted, routed and
received.
73.
74. Protocol layering
Protocols provide specialized services by
relying on services provided by lower-level
protocols (i.e., they leverage lower-level
services).
Reliable
byte stream
delivery
(process-
process)
Unreliable
best effort
datagram
delivery
(host-host)
Unreliable
best effort
datagram
delivery
(process-
process)
User application program (FTP, Telnet, WWW, email)
User datagram protocol
(UDP)
Transmission control
protocol (TCP)
Internet Protocol (IP)
Network interface (ethernet)
hardware Physical
connection
interface between user
code and OS code
(Sockets interface)
75. Encapsulation
TCP segment
header
data
data
Ethernet frame
header
IP datagram
header
TCP segment
header
data
IP datagram
header
TCP segment
header
data
Application program
TCP
IP
Adapter
Network
OS code
User code
User Interface (API)
OS/adapter interface
(exception mechanism)
Adapter/Network interface
76. Transmission Control Protocol (TCP)
– Efficient flow control
• When sending acknowledgments back to the source, the receiving
TCP process indicates the highest sequence number it can receive
without overflowing its internal buffers
– Full-duplex operation
• TCP processes can both send and receive at the same time
– Multiplexing
• Simultaneous upper-layer conversations can be multiplexed over a
single connection
77. Transmission Control Protocol
• Under the application layer in the protocol stack is the TCP layer.
When applications open a connection to another computer on the
Internet, the messages they send (using a specific application layer
protocol) get passed down the stack to the TCP layer.
• TCP is responsible for routing application protocols to the
correct application on the destination computer.
• To accomplish this, port numbers are used. Ports can be thought of
as separate channels on each computer. For example, you can surf
the web while reading e-mail.
• This is because these two applications (the web browser and the
mail client) used different port numbers. When a packet arrives at a
computer and makes its way up the protocol stack, the TCP layer
decides which application receives the packet based on a port
number.
78. • TCP works like this:
• When the TCP layer receives the application layer protocol
data from above, it segments it into manageable 'chunks'
and then adds a TCP header with specific TCP information
to each 'chunk'.
• The information contained in the TCP header includes the
port number of the application the data needs to be sent to.
• When the TCP layer receives a packet from the IP layer
below it, the TCP layer strips the TCP header data from the
packet, does some data reconstruction if necessary, and then
sends the data to the correct application using the port
number taken from the TCP header.
• This is how TCP routes the data moving through the
protocol stack to the correct application.
79. • TCP is not a textual protocol. TCP is a
connection-oriented, reliable, byte stream
service. Connection-oriented means that two
applications using TCP must first establish a
connection before exchanging data.
• TCP is reliable because for each packet
received, an acknowledgement is sent to the
sender to confirm the delivery. TCP also
includes a checksum in it's header for error-
checking the received data. The TCP header
looks like this:
80.
81. Internet Protocol
• Unlike TCP, IP is an unreliable, connectionless protocol.
IP doesn't care whether a packet gets to it's destination or
not. Nor does IP know about connections and port
numbers.
• IP's job is too send and route packets to other
computers. IP packets are independent entities and may
arrive out of order or not at all. It is TCP's job to make sure
packets arrive and are in the correct order.
• About the only thing IP has in common with TCP is the
way it receives data and adds it's own IP header information
to the TCP data. The IP header looks like this:
82.
83. • Above we see the IP addresses of the sending and
receiving computers in the IP header.
• Below is what a packet looks like after passing
through the application layer, TCP layer, and IP
layer.
• The application layer data is segmented in the
TCP layer, the TCP header is added, the packet
continues to the IP layer, the IP header is added,
and then the packet is transmitted across the
Internet.
84.
85. • Hopefully the next router will know where to
send the packet. If it does not, again the packet is
routed upwards until it reaches a NSP backbone.
• The routers connected to the NSP backbones hold
the largest routing tables and here the packet will
be routed to the correct backbone, where it will
begin its journey 'downward' through smaller and
smaller networks until it finds it's destination.
86. • Eventually, the packets reach computer 5.6.7.8.
Here, the packets start at the bottom of the
destination computer's TCP/IP stack and work
upwards.
• As the packets go upwards through the stack, all
routing data that the sending computer's stack
added (such as IP address and port number) is
stripped from the packets.
• When the data reaches the top of the stack, the
packets have been re-assembled into their original
form, "Hello computer 5.6.7.8!"
87. The Ping Program
• If you're using Microsoft Windows and have a connection to
the Internet, there is a handy program to see if a computer on
the Internet is alive. It's called ping.
• If you are using Windows, start a command prompt window. If
you're using a flavor of Unix, get to a command prompt.
Type ping www.yahoo.com.
• The ping program will send a 'ping' (actually an ICMP
(Internet Control Message Protocol) echo request message) to
the named computer.
88. • The pinged computer will respond with a
reply. The ping program will count the time
expired until the reply comes back (if it does).
• Also, if you enter a domain name (i.e.
www.yahoo.com) instead of an IP address,
ping will resolve the domain name and display
the computer's IP address. More on domain
names and address resolution later.
89. General protocol suite description
• T ~ ~ ~ T
• [A] [B]_____[C]
• Imagine three computers: A, B, and C. A and B both have radio
equipment, and can communicate via the airwaves using a suitable
network protocol (such as IEEE 802.11.) B and C are connected via
a cable, using it to exchange data (again, with the help of a protocol,
for example Ethernet).
• However, neither of these two protocols will be able to transport
information from A to C, because these computers are conceptually
on different networks. One, therefore, needs an inter-network
protocol to "connect" them.
90. • One could combine the two protocols to form a powerful
third, mastering both cable and wireless transmission, but a
different super-protocol would be needed for each possible
combination of protocols.
• It is easier to leave the base protocols alone, and design a
protocol that can work on top of any of them (the Internet
Protocol is an example.) This will make two stacks of two
protocols each.
• The inter-network protocol will communicate with each of
the base protocol in their simpler language; the base
protocols will not talk directly to each other.
91. • A request on computer A to send a chunk of data to C is
taken by the upper protocol, which (through whatever
means) knows that C is reachable through B.
• It, therefore, instructs the wireless protocol to transmit the
data packet to B.
• On this computer, the lower layer handlers will pass the
packet up to the inter-network protocol, which, on
recognizing that B is not the final destination, will again
invoke lower-level functions.
• .
92. • This time, the cable protocol is used to send
the data to C. There, the received packet is
again passed to the upper protocol, which
(with C being the destination) will pass it on to
a higher protocol or application on C.
• Often an even higher-level protocol will sit on
top, and incur further processing
93. Internet Addresses
• Because the Internet is a global network of computers each
computer connected to the Internet must have a unique address.
Internet addresses are in the form nnn.nnn.nnn.nnn where nnn
must be a number from 0 - 255.
• This address is known as an IP address. (IP stands for Internet
Protocol; more on this later.)The picture below illustrates two
computers connected to the Internet; your computer with IP
address 1.2.3.4 and another computer with IP address 5.6.7.8.
ed.)
94. • If you connect to the Internet through an Internet
Service Provider (ISP), you are usually assigned a
temporary IP address for the duration of your dial-in
session. I
• f you connect to the Internet from a local area network
(LAN) your computer might have a permanent IP
address or it might obtain a temporary one from a
DHCP (Dynamic Host Configuration Protocol) server.
• In any case, if you are connected to the Internet, your
computer has a unique IP address.
95. • If we were to follow the path that the message
"Hello computer 5.6.7.8!" took from our
computer to the computer with IP address
5.6.7.8, it would happen something like this:
96. The process of sending a massage
over the internet
• The message would start at the top of the protocol stack on your
computer and work it's way downward.
• If the message to be sent is long, each stack layer that the message
passes through may break the message up into smaller chunks of
data. This is because data sent over the Internet (and most computer
networks) are sent in manageable chunks. On the Internet, these
chunks of data are known as packets.
• The packets would go through the Application Layer and continue to
the TCP layer. Each packet is assigned a port number.
• We need to know which program on the destination computer needs
to receive the message because it will be listening on a specific port.
97. • After going through the TCP layer, the packets proceed to the
IP layer. This is where each packet receives it's destination
address, 5.6.7.8.
• Now that our message packets have a port number and an IP
address, they are ready to be sent over the Internet. The
hardware layer takes care of turning our packets containing the
alphabetic text of our message into electronic signals and
transmitting them over the phone line.
• On the other end of the phone line your ISP has a direct
connection to the Internet. The ISPs router examines the
destination address in each packet and determines where to
send it. Often, the packet's next stop is another router. More on
routers and Internet infrastructure later.
98. How TCP/IP Works
Transfer Control Protocol
(TCP) breaks data into
small pieces of no bigger
than 1500 characters
each. These “pieces” are
called packets.
101010101001
101010011010
011010210101
010101011010
111101010111
011101110110
110000101110
110101010101
001110101001
010111101000
101010101001
101010011010
011010210101
010101011010
111101010111
011101110110
110000101110
110101010101
001110101001
010111101000
99. How TCP/IP Works
• Each packet is inserted
into different Internet
Protocol (IP)
“envelopes.” Each
contains the address of
the intended recipient
and has the exact same
header as all other
envelopes.
100. How TCP/IP Works
• A router receives the
packets and then
determines the most
efficient way to send
the packets to the
recipient.
• After traveling along a
series of routers, the
packets arrive at their
destination.
101. How TCP/IP Works
• Upon arrival at their
destination, TCP checks
the data for corruption
against the header
included in each packet.
If TCP finds a bad
packet, it sends a
request that the packet
be re-transmitted.
102. TCP/IP and Domain Names
• Basic task of IP – moving packets as quickly
as possible from one router to another
• Yet, it doesn’t check whether packets are
delivered successfully, thus need TCP
• TCP (Transmission Control Protocol) –
disassemble/reassemble packets, error
checking, ACK packets
103. TCP/IP and Domain Names
• We need some sort of address in order to identify
different nodes, as if every house has a mailing
address in order to receive mail from others
• The one used by Internet Protocol is called IP
address.
• Every host on the Internet has a unique IP address,
made up of four numbers. E.g.. 192.56.215.131,
each number is between 0 and 255
104. TCP/IP and Domain Names
• The numbers in an IP address is hard to remember, while
names are easier.
• Domain Name System – a mapping between the human-
readable name (domain name) of a host and its IP address.
• A domain name consists of two or more parts, e.g.
cs.pitt.edu
• The rightmost label conveys the top-level domain, e.g. edu
105. TCP/IP and Domain Names
• Each label to the left specifies a subdomain, in our
example, subdomain is pitt (University of
Pittsburgh), and sub-subdomain is cs (computer
science).
• A top-level domain contains of multiple
subdomains, each subdomain can contain multiple
sub-subdomain, so on.
• The database contains the mapping between a
domain name and an IP address is stored on a
DNS server.
107. HTTP Authentication
• Protect web content from those who don’t have a “need to know”
• Require users to authenticate using a userid/password before they are
allowed access to certain URLs
• HTTP/1.1 requires that when a user makes a request for a protected
resource the server responds with a authentication request header
– WWW-Authenticate
• contains enough pertinent information to carry out a “challenge-response”
session between the user and the server
Web Server
Client
Client requests a protected resource
Server responds with a 401 (not
authorized and a challenge request
for the client to authenticate
108. Client Response
• Well established clients like Firefox, Internet Explorer …. will respond to
the challenge request (WWW-Authenticate) by presenting the user with a
small pop-up window with data entry fields for
– userid
– password
– a Submit button and a Cancel button
• entering a valid userid and password will post the data to the server, the
server will attempt authentication and if authenticated will serve the
originally requested resource.
109. WWW-Authenticate
• The authentication request received by the browser will look
something like:
– WWW-Authenticate = Basic realm=“defaultRealm”
• Basic indicates the HTTP Basic authentication is requested
• realm indicates the context of the login
– realms hold all of the parts of security puzzle
» Users
» Groups
» ACLs (Access Control Lists)
• Basic Authentication
– userid and password are sent base 64 encoded (might as well be plain
text)
– hacker doesn’t even need to unencode all he has to do is “replay” the blob
of information he stole over and over ( this is called a “replay attack”)
110. WWW-Authenticate
• Digest Authentication
– attempts to overcome the shortcomings of Basic Authentication
– WWW-Authenticate = Digest realm=“defaultRealm” nonce=“Server SpecificString”
– see RFC 2069 for description of nonce, each nonce is different
– the nonce is used in the browser in a 1-way function (MD5, SHA-1….) to encode the
userid and password for the server, this function essentially makes the password good
for only one time
• Common browsers don’t use Digest Authentication but an applet could as an
applet has access to all of the Java Encryption classes needed to create the
creation of a Digest.
111. WWW-Authenticate
• Secure Sockets Layer (SSL)
– Invented by Netscape and made public domain for everyone’s use
– An additional layer to the TCP/IP stack that sits between the Application
and Transport layers
• ensures that all application data is encrypted but TCP/IP headers are not
• usually run on port 443 (default HTTPS port)
• Public Key Cryptography
– owner of a private key sends a public key to all who want to communicate
with him (keys are both prime factors of a large (1024 bit) number).
Owner keeps the private key secret and uses it to decrypt information sent
to him that has been encrypted with the public-key
– RSA algorithm is most notable public-key cipher algorithm
• Digital Certificates
– issued by a disinterested third party (ex. Verisign)
– the Certificate contains the public-key for the specific Web Server and a
digital signature of the certifying authority
112. Security Requirements
• Confidentiality
– Preserving authorized restrictions on information
access and disclosure, including means for protecting
personal privacy and proprietary information.
• Integrity
– Guarding against information modifications or
destruction, including ensuring information non-
repudiation and authenticity.
• Availability
– Ensuring timely and reliable access to and use of
information
113. Security Attacks,
Mechanisms & Services
• Security Attack
– Any action that compromises the security of
information
• Security Mechanism
– A process / device that is designed to detect, prevent or
recover from a security attack.
• Security Service
– A service intended to counter security attacks,
typically by implementing one or more mechanisms.
114. 114
Viruses and Worms
A computer virus is a small program that alters the
way a computer operates and often does various types
of damage by deleting and corrupting data and
program files, or by altering operating system
components, so that computer operation is impaired or
even halted.
Many different types of viruses, such as parasitic, boot
sector, stealth, polymorphic, and macro.
115. 115
Viruses and Worms
A computer worm is a program that copies itself
from one system to another over a network,
without the assistance of a human being.
Worms usually propagate themselves by
transferring from computer to computer via e-mail.
Typically, a virus or a worm is transported as a
Trojan horse—in other words, hiding inside a
harmless-looking piece of code such as an e-mail
or an application macro.
116. 116
Standard System Attacks
Two leading forms of attacks the last few years:
1. Exploiting known operating system vulnerabilities
2. Exploiting known vulnerabilities in application
software
For both of these, software company issues a patch.
Patch may fix it, or introduce even more holes.
Either way, bad guys find new holes and exploit.
117. 117
Standard System Attacks
A very common way to attack vulnerability is via an e-
mail attachment. You open the attachment and you
launch the virus.
Second common way to attack is to simply scan your
computer ports while you are connected to the Internet
(either dial-up or non-dial-up). If you have an open
port, hacker will download malicious software to your
machine.
118. 118
Other Standard System Attacks
Denial of service attacks, or distributed denial of service attacks, bombard a
computer site with so many messages that the site is incapable of answering
valid request.
In e-mail bombing, a user sends an excessive amount of unwanted e-mail to
someone.
Smurfing is a nasty technique in which a program attacks a network by
exploiting IP broadcast addressing operations.
Ping storm is a condition in which the Internet Ping program is used to send a
flood of packets to a server.
Spoofing is when a user creates a packet that appears to be something else or
from someone else.
Trojan Horse is a malicious piece of code hidden inside a seemingly harmless
piece of code.
Stealing, guessing, and intercepting passwords is also a tried and true form of
attack.
119. 119
Physical Protection
Protection from environmental damage such as floods,
earthquakes, and heat.
Physical security such as locking rooms, locking down
computers, keyboards, and other devices.
Electrical protection from power surges.
Noise protection from placing computers away from
devices that generate electromagnetic interference.
120. 120
Physical Protection - Surveillance
Proper placement of security cameras can deter theft and
vandalism.
Cameras can also provide a record of activities.
Intrusion detection is a field of study in which specialists try to
prevent intrusion and try to determine if a computer system has
been violated.
A honeypot is an indirect form of surveillance. Network
personnel create a trap, watching for unscrupulous activity
121. 121
Basic Encryption and Decryption
Cryptography is the study of creating and using
encryption and decryption techniques.
Plaintext is the the data that before any encryption has
been performed.
Ciphertext is the data after encryption has been
performed.
The key is the unique piece of information that is used to
create ciphertext and decrypt the ciphertext back into
plaintext.
123. 123
Monoalphabetic Substitution-based Ciphers
Monoalphabetic substitution-based ciphers replace a
character or characters with a different character or
characters, based upon some key.
Replacing: abcdefghijklmnopqrstuvwxyz
With: POIUYTREWQLKJHGFDSAMNBVCXZ
The message: how about lunch at noon
encodes into EGVPO GNMKN HIEPM HGGH
124. 124
Polyalphabetic Substitution-based Ciphers
Similar to monoalphabetic ciphers except multiple
alphabetic strings are used to encode the plaintext.
For example, a matrix of strings, 26 rows by 26
characters or columns can be used.
A key such as COMPUTERSCIENCE is placed
repeatedly over the plaintext.
COMPUTERSCIENCECOMPUTERSCIENCECOMPUT
ER
thisclassondatacommunicationsisthebe
st
125. 125
Digital Signatures
Document to be signed is sent through a complex
mathematical computation that generates a hash.
Hash is encoded with the owner’s private key then
stored.
To prove future ownership, stored hash is decoded
using the owner’s public key and that hash is
compared with a current hash of the document.
If the two hashes agree, the document belongs to the
owner.
The U.S. has just approved legislation to accept
digitally signed documents as legal proof.
126. 126
Public Key Infrastructure
The combination of encryption techniques, software, and
services that involves all the necessary pieces to support digital
certificates, certificate authorities, and public key generation,
storage, and management.
A certificate, or digital certificate, is an electronic document,
similar to a passport, that establishes your credentials when you
are performing transactions.
127. 127
Public Key Infrastructure
A digital certificate contains your name, serial
number, expiration dates, copy of your public
key, and digital signature of certificate-issuing
authority.
Certificates are usually kept in a registry so
other users may check them for authenticity.
128. 128
Public Key Infrastructure
Certificates are issued by a certificate authority
(CA). A CA is either specialized software on a
company network or a trusted third party.
Let’s say you want to order something over the
Internet. The web site wants to make sure you
are legit, so the web server requests your
browser to sign the order with your private key
(obtained from your certificate).
129. 129
Public Key Infrastructure
The web server then requests your certificate from the
third party CA, validates that certificate by verifying
third party’s signature, then uses that certificate to
validate the signature on your order.
The user can do the same procedure to make sure the
web server is not a bogus operation.
A certificate revocation list is used to “deactivate” a
user’s certificate.
130. 130
Public Key Infrastructure
Applications that could benefit from PKI:
• World Wide Web transactions
• Virtual private networks
• Electronic mail
• Client-server applications
• Banking transactions
131. 131
Steganography
The art and science of hiding information inside other,
seemingly ordinary messages or documents.
Unlike sending an encrypted message, you do not
know when steganography is hiding a secret message
within a document.
Examples include creating a watermark over an image
or taking “random” pixels from an image and
replacing them with the hidden data.
132. 132
Securing Communications
So far we have examined standard system attacks,
physical protection, controlling access, and securing
data. Now let’s examine securing communications.
One way to secure the transfer of data is to scramble
the signal as it is being transmitted. This is called
spread spectrum technology.
133. 133
Guarding Against Viruses
Signature-based scanners look for particular virus
patterns or signatures and alert the user.
Terminate-and-stay-resident programs run in the
background constantly watching for viruses and their
actions.
Multi-level generic scanning is a combination of
antivirus techniques including intelligent checksum
analysis and expert system analysis.
134. 134
Firewalls
A system or combination of systems that supports an
access control policy between two networks.
A firewall can limit the types of transactions that enter
a system, as well as the types of transactions that leave
a system.
Firewalls can be programmed to stop certain types or
ranges of IP addresses, as well as certain types of TCP
port numbers (applications).
135. 135
Firewalls
A packet filter firewall is essentially a router that has
been programmed to filter out or allow to pass certain
IP addresses or TCP port numbers.
A proxy server is a more advanced firewall that acts as
a doorman into a corporate network. Any external
transaction that request something from the corporate
network must enter through the proxy server.
Proxy servers are more advanced but make external
accesses slower.
138. 138
Wireless Security
How do you make a wireless LAN secure?
WEP (Wired Equivalency Protocol) was the first
security protocol used with wireless LANs. It had
weak 40-bit static keys and was too easy to break.
WPA (Wi-Fi Protected Access) replaced WEP. Major
improvement including dynamic key encryption and
mutual authentication for wireless clients.
139. 139
Wireless Security
Both of these should eventually give way to a new
protocol created by the IEEE - IEEE 802.11i.
802.11i allows the keys, the encryption algorithms,
and negotiation to be dynamically assigned.
Also, AES encryption based on the Rijndael algorithm
with 128-, 192-, or 256-bit keys is incorporated.
140. 140
Security Policy Design Issues
What is the company’s desired level of security?
How much money is the company willing to invest in
security?
If the company is serious about restricting access
through an Internet link, what about restricting access
through all other entry ways?
The company must have a well-designed security
policy.
141. 141
Network Security In Action: Making Wireless LANs
Secure
Recall Hannah the network administrator from
Chapters Seven, Eight, and Nine? Now her company
wants to add a wireless LAN to their system and make
it secure.
She needs to protect herself from war drivers.
Should she use WEP?
What about Cisco’s LEAP (Lightweight Extensible
Authentication Protocol)?
142. 142
Network Security In Action: Making Wireless LANs
Secure
What about WPA? It is relatively new. Is the software
and hardware all compatible with WPA?
If she decides to use WPA, where does she have to
install the WPA software? In the user’s laptop? At the
wireless access point? At the network server? All the
above?
143. End of : Internet Techniques &
Web programming course