DSpace Repository

Browsing by Subject "Computer security"

Browsing by Subject "Computer security"

Sort by: Order: Results:

  • Sarkar, Sajibe Kanti (Daffodil International University, 2021-12-20)
    The goal of this project is to ensure the security of any business or institution. A major problem in the twenty-first century is cyber security and data breaches. The covid-19 situations drive every end user and institution ...
  • Rashid, Md.Mamun Or (Daffodil International University, 2018-07-01)
    If two and more computers are interconnected and able to exchange data or information then we call network. We want to increase the number of PC‟s and exchange data or information from one to another that time we need ...
  • Talim, Kazi (Daffodil International University, 2019-12-26)
    This thesis described the necessity, deployment considerations, performance evaluation and the possible outcomes of using the next-generation firewalls (NGFW) in an enterprise network environment. A firewall is the most ...
  • Koushik, Mitra (Daffodil International University, 22-12-09)
    My name is Koushik Mitra and my id is 191-35-2691.Now I am working as Junior Pentester at Rightime Limited from 01/09/2022.As a part of my undergraduate program of B.Sc. in Software Engineering (Major in Cybersecurity) ...
  • Ferdush, Jannatul (Daffodil International University, 2019-12-11)
    The title of this Entry level position Report is "Budget report Investigation of First Security Islami Bank Constrained" was allocated by my Temporary job manager and endorsed by the College authority. This report dependent ...
  • Mahmud, Pavel; Ruman, Md. All; Khan, Shifat Hossain (Daffodil International University, 2021-09-24)
    An Implementation of Digital Systems in Eliminating Unemployment (Instant Jobs) is a platform where people can hire employees to facilitate their work. Provides three types of work facilities on the platform, 1st direct ...
  • Shohug, Md. Mahfuj Hasan (Daffodil International University, 2022-03-30)
    Malware classification is essential for tracing the source of computer security threats. On the Internet, malware evolves at a rapid rate, and the bulk of undiscovered malware is developed from known malware. The number ...
  • Islam, Md. Manirul; Nayem, Md. Jannatul; Mondol, Md. Rezwan (Daffodil International University, 2019-04)
    At present wireless network trends to be more and more popular among the population with the millions of users. The Man-In-The-Middle (MITM) attack is one of the most well-known attacks in computer security, representing ...
  • Mahi, Md. Julkar Nayeen; Chaki, Sudipto; Humayun, Esraq; Imran, Hafizul; Barros, Alistair; Whaiduzzaman, Md. (Institute of Electrical and Electronics Engineers Inc., 2023-05-02)
    Vehicular Adhoc Network (VANET) is an established technology that is well-suited for emerging technologies such as the Internet of Vehicles (IoV) and Unmanned Aerial Vehicles (UAVs). However, while VANET offers improved ...
  • Goswami, Tanmoy Kumar; Reshad, Towhidul Islam (Daffodil International University, 2021-06-03)
    Networking is the transfer of data and idea which connects people all over the world for exploring, detaching issues. IPv6 allows for the development of more specific TCP/IP address identifiers, avoiding carrier NAT ...
  • Haque, Md. Mohaiminul (Daffodil International University, 2019-05-06)
    Identifying an individual with a picture has been popularized through the mass media and in scientific research. However, it is less sturdy to fingerprint or membrane scanning. This report describes the face detection ...
  • Rafi, Md. Rahim-Ur Rahman (Daffodil International University, 2019-05-12)
    Identifying an individual’s motion with a video capturing via Time-series has been popularized through the mass media and in scientific research. However, This report describes the object’s motion detection forsurveillancing ...
  • Hossen, Md. Amir; Aktar, Most. Mahfuja (©Daffodil International University, 2021-01-14)
    Automation may in general be defined as a process with little to no human effort following predetermined sequential steps. Different cameras, suitable for monitoring manufacturing procedures, actuators and various techniques ...
  • Mohamed, Abdifatah Ahmed (Daffodil International University, 22-06-27)
    In recent years, a study on cyber security have become more prevalent. New mobile solutions are being created in the form of Internet-capable mobile devices like the iPhone and new wireless networks like LTE and WiMAX. ...
  • Khan, Mohammad Jobaer (Daffodil International University, 22-11-05)
    I interned as a VA/PT specialist at BugsBD Limited Internships as part of my Undergraduate Degree of Bsc in Software Engineering at Daffodil International University. In my internship period I worked especially in web ...

Search DSpace

Browse

My Account