In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This thesis is on Today s Impact on...
In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP a...
Linta, Sharmin Rashid, Khan, Ridgewan, Ahmed, Faysal
Today s World Wide Web (WWW) is known as Web 2.0. It includes social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, mashups and folksonomies. It also includes E-learning Management system. It is a process in which we use the electronic medium to access the defined set of applications, cand processes.Because of a lot of limitations using web 2.0 for creating E-learning management system, now-a-days we use Web 3.0 which is known as Semantic web.Our paper is Towards E-Learning Management System using Semantic Web and a unique University namespace univ ,...
Today s World Wide Web (WWW) is known as Web 2.0. It includes social networking sites, blogs, wikis, video sharing sites, hosted services, web applica...