COMPUTER SECUIRTY WITH COMPUTER PROTECTIONAND NETWORK MANAGEMENT
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them,aswellasfrom disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,] and due to malpractice by operators, whether intentional, accidental, or due to thembeing tricked into deviating from secure procedures.The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Authors and Affiliations
Smt Ambikatai V Mittapally*
Leaf Recognition Algorithm Using MLP Neural Network Based Image Processing
In this paper, we employ Multilayer Perceptron with image and data processing techniques and neural network to implement a general purpose automated leaf recognition. Sampling leaves and photoing them are low cos...
ANALYSIS AND DESIGN OF FUEL THEFT PREVENTION AND AUTOMATION
Motorcycles are popular mode of transport. All motorcycles are petrol driven whose costs have been increasing steadily. The motorcycles come with a simple fuel delivery mechanism which is nothing but simple ta...
ANALYSIS OF EARTHQUAKE LOADS ON G+7 STOREYED BUILDING WITH CONCETRIC BRACING SYSTEM AND ECCENTRIC BRACING SYSTEM USING RESIST SOFTWARE
The proposed project is to analyze the performance of G + 7 multi storied building for lateral forces, (seismic/wind). Work was carried out considering seismic zones (II, III, IV and V) and hard, medium, soft type...
RELATIVE STUDY OF OUTLIER DETECTION PROCEDURES
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the percep...
DISCRETE POPULATION GROWTH MODEL WITH CONSTANT FORCED REPRODUCTION AND CONSTANT HARVESTING
A generalization of discrete logistic growth model is considered. Constant harvesting for human consumption of species is taken into account. At the same time, forced reproduction of the same species is also consi...