Interline Publishing
 info@interlinepublishing.com +91 98867 328 23 / 24 / 25   +91 80 2333 2824 Sign Up   Sign In
Interline Publishing
Skip to Reader

Set up video

    Subscription offer
         (Unlimited Download)
Amount Validity
र 100 6 months
र 200 1 year
     
 
BU Advanced E-Commerce and Mobile Commerce Sem II
Module - 1 : NA(Threats in e-commerce, Encryption overview, Elements of an encryption system, Secret key encryption, Public-key encryption, Digital signatures, Digital Certificates, Types of Cryptographies, Secure Sockets Layer (SSL), Smart Cards and its applications, Electronic Data Interchange, Evolution, uses, Benefits, Working of EDI, EDI Standards, EDI Components, EDI Services, ANSI, X12 and EDIFACT)
1. Cryptography(Computer Science) Total View (0)
 
Solved Questions of Cryptography
Title: INFORMATION AND NETWORK SECURITY Solved Question Bank
Published on: 29/10/18
Author:
Publisher:
Pages: 14
Price: Rs 7

2. Cryptography(Computer Science) Total View (0)
 
Crypt-analysis is the process of obtaining the original message (called the plaintext) from an encrypted message (called the ciphertext) without knowing the algorithms and keys used to perform the encryption.
Title: INFORMATION AND NETWORK SECURITY
Published on: 29/10/18
Author:
Publisher:
Pages: 18
Price: Rs 9

3. Wireless Communication and Networks(Satellite Communication ) Total View (723)
 
Other Communication Topics, Wireless Communication and Networks, Introduction, Various Types of Networks, Seven Layer Osi (Open System Interconnection) Model, Mobile Communication Networks, Cellular Mobile Telephone System: Overview, Definitions for Cellular Mobile System, Call Making Process, Mobile Communications 1st, 2nd, 3rd and 4th Generations, GSM, Components in A Cellular Mobile System, Cel ......
Title: Fundamentals of Satellite Communication
Published on: 09/06/14
Author: Raman S K
Publisher: Sanguine Technical Publishers
Pages: 47
Price: Rs 35.25

4. E-Commerce_Question Paper - December 2009 / January 2010(E-Commerce) Total View (255)
 
E-Commerce_Question Paper - December 2009 / January 2010
Title: M.Sc Information Technology_Question Papers
Published on: 28/10/14
Author: KSOU
Publisher: Karnataka State Open University
Pages: 2
Price: Rs 1.5

5. Introduction, Basics of Cryptography, Secret Key Cryptography(Computer Science) Total View (1)
 
Computer security is all about studying cyber attacks with a view to defending against them. The attacks include pharming and phishing attacks together with assorted malware and denial of service attacks.
Title: Cryptography, Network Security and Cyber Law
Published on: 01/10/18
Author:
Publisher:
Pages: 25
Price: Rs 0

6. Security at the Transport Layer(Computer Science and Networking) Total View (0)
 
Security at the Transport Layer
Title: Cryptography and Network Security
Published on: 03/04/18
Author: Chitra Ravi
Publisher: Subhas Stores
Pages: 12
Price: Rs 7.8

7. Key Management, Authentication-I & II, IPSec-security at the network layer, Security at transport layer(Computer Science) Total View (0)
 
Key management is related to the generation, storage, distribution, and backup of keys. The focus is on the management of public key—private key pairs. The public key—private key pairs are used for encryption/decryption, signature generation/ verification, and for authentication.
Title: Cryptography, Network Security and Cyber Law
Published on: 01/10/18
Author:
Publisher:
Pages: 56
Price: Rs 28

8. SECURITY(Computer Science) Total View (0)
 
A security protocol for ad hoc wireless networks should satisfy the following requirements
Title: AD-HOC NETWORKS
Published on: 28/09/18
Author:
Publisher:
Pages: 23
Price: Rs 11.5

9. Cryptography and network Security(Computer Science and Networking) Total View (2)
 
With ever increasing expansion of the global networks and informa􀆟 on systems in the world, the secure computing and communication on becomes vital. There are a lot of security threats in various forms. It is highly important to secure informa􀆟 on from malwares and phishing
Title: Cryptography and Network Security
Published on: 03/04/18
Author: Chitra Ravi
Publisher: Subhas Stores
Pages: 13
Price: Rs 0

10. Introduction to Wireless Telecommunication Systems and Networks(Electronics and Communication) Total View (0)
 
Communication is the transfer of information form one point to another. Invention of telephone by Bell in 1876 was the first manually switched wireline network.
Title: Wireless Communication
Published on: 05/10/18
Author:
Publisher:
Pages: 16
Price: Rs 0

11. Implementation Fabrics(Electronics and Communication) Total View (0)
 
Invention of the integrated circuit is credited to Jack Kilby at Texas Instruments in 1958. The techniques were refined by several developers, and the market for ICs grew rapidly during the 1960s.
Title: Digital System Design Using Verilog
Published on: 09/10/18
Author:
Publisher:
Pages: 17
Price: Rs 8.5

12. IEEE 802.11 Wireless LAN Security, Viruses,Worms and Other Malware, Firewalls, Intrusion Prevention and Detection, Web Services Security (Computer Science) Total View (0)
 
Wireless networks present formidable challenges in the area of security. The open nature of such networks makes it relatively easy to sniff packets or even modify and inject malicious packets into the network.
Title: Cryptography, Network Security and Cyber Law
Published on: 01/10/18
Author:
Publisher:
Pages: 62
Price: Rs 31

13. Introduction, Physical Layer(Computer Science) Total View (1)
 
Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.
Title: Data Communication
Published on: 29/10/18
Author:
Publisher:
Pages: 65
Price: Rs 0

14. Privacy and Security in GSM(Electronics and Communication) Total View (0)
 
Cellular fraud is extensive in analog cellular systems since the identity of the subscriber is sent to the network without encryption. The GSM system, on the other hand, has security controls that virtually eliminate cloning fraud.
Title: GSM
Published on: 05/10/18
Author:
Publisher:
Pages: 15
Price: Rs 7.5

15. Wireless and Mobile Networks(Computer Science) Total View (0)
 
A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.
Title: Computer Networks
Published on: 27/09/18
Author:
Publisher:
Pages: 19
Price: Rs 9.5

16. EMBEDDED SYSTEM COMPONENTS(Electronics and Communication) Total View (0)
 
An embedded system is a combination of 3 types of components: Hardware, Software, Mechanical Components and it is supposed to do one specific task only.
Title: Arm Microcontroller and Embedded Systems
Published on: 09/10/18
Author:
Publisher:
Pages: 40
Price: Rs 20

17. Storage Security Framework(Computer Science) Total View (1)
 
The basic security framework is built around the four primary services of security:accountability, confidentiality, integrity, and availability
Title: Storage Area Networks
Published on: 28/09/18
Author:
Publisher:
Pages: 17
Price: Rs 8.5

18. General Features of a Computer(Computer Fundamentals) Total View (63)
 
Computers today have made a great impact on almost every aspect of human life. They are being used for all sorts of applications. In fact the application areas of computers are confined only by limitations of human creativity and imagination.
Title: Computer Fundamentals
Published on: 20/11/14
Author: Rama M A
Publisher: Subhas Stores
Pages: 28
Price: Rs 0

19. DEMATERIALIZATION(Financial Management ) Total View (0)
 
The Indian Stock markets have seen a major change with the introduction of depository system and scrip less trading mechanism. There were various problems like inordinate delays in the transfer of share certificates, delay in receipt of securities and inadequate infrastructure in banking and postal segments to handle a large volume of application and storage of share certificates .To overcome ......
Title: Security Analysis and Portfolio Management
Published on: 19/12/17
Author: Mohammed Arif pasha
Publisher: Interlinepublishing
Pages: 11
Price: Rs 6.6

20. GSM AND TDMA TECHNOLOGIES(Electronics and Communication) Total View (0)
 
Global System for Mobile Communications (GSM) services are a standard collection of applications and features available to mobile phone subscribers all over the world.
Title: Wireless Communication
Published on: 05/10/18
Author:
Publisher:
Pages: 10
Price: Rs 5

21. IT ACT(Computer Science) Total View (0)
 
The act attempts to address the following issues: legal recognition of electronic documents, legal recognition of digital signatures, offences, justice dispensation for cyber crimes
Title: Cryptography, Network Security and Cyber Law
Published on: 01/10/18
Author:
Publisher:
Pages: 36
Price: Rs 18

22. GSM Architecture and Interfaces(Electronics and Communication) Total View (0)
 
The GSM system is a frequency- and time-division system. GSM system frequencies include two bands at 900 MHz and 1800 MHz commonly referred to as the GSM-900 and DCS-1800 systems.
Title: GSM
Published on: 05/10/18
Author:
Publisher:
Pages: 14
Price: Rs 0

23. Cloud Computing Architecture(Computer Science) Total View (0)
 
Cloud computing is a utility-oriented and Internet-centric way of delivering IT services on demand. These services cover the entire computing stack: from the hardware infrastructure pack- aged as a set of virtual machines to software services such as development platforms and distributed applications.
Title: Cloud Computing
Published on: 27/09/18
Author:
Publisher:
Pages: 35
Price: Rs 17.5

24. Security at the Network Layer(Computer Science and Networking) Total View (0)
 
Security at the Network Layer
Title: Cryptography and Network Security
Published on: 03/04/18
Author: Chitra Ravi
Publisher: Subhas Stores
Pages: 20
Price: Rs 13

25. Design of Files- Design of Database, Interactions Input-Control- Procedures, Implementation, Organization for Implementations(Management Information system and Computer Applications) Total View (412)
 
To build any information system one require to know infrastructure like application infrastructure, Information technology architecture, network architecture, data architecture,interface architecture and process architectures. To have these one has to start with systems design which leads to a robust information system.
Title: MB107 Management Information System and Computer Applications
Published on: 05/04/14
Author: KSOU
Publisher: Karnataka State Open University
Pages: 41
Price: Rs 30.75



 
Home
About Us
Payments
Contact Us
Claims
Help
Advertising Guidelines
Safe and Secure Payment
All major credit and debit cards are accepted.
Policies: Terms of Use | Privacy    Copyright © 2019 Interline Publishing. All rights reserved.