Posts

Showing posts from July, 2020

OOPs(CSE-1834) Reference Books

  GET ALL BOOKS : Download here

Reference books for Discrete Mathematics

C. L. Liu, “Elements of Discrete Mathematics”, Tata McGraw-Hill Edition. click here Kenneth H. Rosen, “Discrete Mathematics and its applications”, McGraw Hill. click here Lipschutz, “Discrete mathematics (Schaum)”, TMH click here Deo, Narsingh, “Graph Theory With application to Engineering and Computer Science”, PHI. click here Trembley, J.P and Manohar, “Discrete Mathematical Structure with Application CS”, McGraw Hill. clicl here Krishnamurthy V, “Combinatorics Theory and Application”, East-West Press Pvt. Ltd.,New Delhi. click here Kenneth H. Rosen "Discrete Mathematics and its application", McGraw Hill 8th Edition click here S K Sarkar, “Discrete Mathematics”, S.Chand Pub.

Computer Organization and Architecture Preferred Books (CS-1833)

Morris Mano M., "Digital Logic and computer Design", Pearson. click here Morris Mano M., "Computer system Architecture", Pearson PHI. click here Govindarajalu, "Computer Architecture and Organization",TMH click here Malvino (Brown),"Digital Computer Electronics", TMH click here Willaiam Stalling,"Computer Organization and Architecture:Designing for Performance",Prentice-Hall India click here Carl Hamacher, Zvonko Vranesic and Safwat,"Computer Organization", McGraw Hill Liu and Gibson, "8086/8088 Micro Processor Assembly Language", PHI EXTRA BOOKS Computer Systems(3rd ed.)-Randal E. Bryant,David R. O'Hallaron click here Web Course Developed for NPTEL Computer Organization and Architecture click here

THE CIA TRAID

Image
Confidentiality, Integrity, and Availability Confidentiality, integrity and availability, known as the CIA triad (Figure ), is a guideline for information security for an organization. Confidentiality ensures the privacy of data by restricting access through authentication encryption. Integrity assures that the information is accurate and trustworthy. Availability ensures that the information is accessible to authorized people. Confidentiality Another term for confidentiality would be privacy. Company policies should restrict access to the information to authorized personnel and ensure that only those authorized individuals view this data. The data may be compartmentalized according to the security or sensitivity level of the information. For example, a Java program developer should not have to access to the personal information of all employees. Furthermore, employees should receive training to under

Your Online and Offline identity

As more and more time we spend on the internet, our identity, both online and offline gets affected. Your offline identity is the person who interacts with your friends family on a daily basis at home, school or work. they know your personal information such as your name, age, or where you live. Your online identity is how you present yourself to others online. this identity only reveals a limited amount of information about us. we only post or update things we like. This could be taken as preparing a resume for online platform. You only do things which are in trend , you follow people you only want to see and maintain relations for a show. You should take care when choosing a username or alias for your online identity. The username should not include any personal information. It should be something appropriate and respectful. This Username should not lead strangers to think you are an easy target for cybercrimes or unwanted attention

Shell scripting

Image
MANUAL BOOK FOR SHELL SCRIPTING * CLICK HERE A shell script is a computer program designed to be run by the Unix/Linux shell which could be one of the following: The Bourne Shell The C Shell The Korn Shell The GNU Bourne-Again Shell A shell is a command-line interpreter and typical operations performed by shell scripts include file manipulation, program execution, and printing text. Extended Shell Scripts Shell scripts have several required constructs that tell the shell environment what to do and when to do it. Of course, most scripts are more complex than the above one. The shell is, after all, a real programming language, complete with variables, control structures, and so forth. No matter how complicated a script gets, it is still just a list of commands executed sequentially. The following script uses the read command which takes the input from the keyboard and assigns it as the value of the variable PERSON and finally prints it on STDOUT. #!/bin/sh # Author :

INTERNET PROTOCOLS

Image
IPv6 (Internet protocol version 6) The INTERNET ENGINEERING TASK FORCE , IETF ( organization responsible for defining the IP standards ). In 1980's the IETF developed IPv4 but as internet explosion took place in 1990s , The TETF realized that they might need the new protocol standards for the Next generation . IPv6 is the second network layer standard protocol that follows IPv4 , it offers increased address size , a streamlined header format , extensible headers & the ability to provide confidentiality and integrity of communications. the following list summarizes the characteristics of IPv6 and the improvements it can deliver: Larger address space : Increased address size from 32 bits to 128 bits Streamlined protocol header : Improves packet-forwarding efficiency Stateless autoconfiguration: The ability for nodes to determine their own address Multicast: Increased use of efficient one-to-many communications Jumbograms: The ability to have very large packet paylo

documentation on wifi hacking

Image
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.  pdf  using tool ''aircrack-ng''  click here VIDEO DEMO  click here