Machine Learning in Malware Detection
1.0 Background Research Malware was first created in 1949 by John von Neumann. Ever since then, more and more malwares are created. Antivirus company are constantly looking for a method…
Read more >Malware And Exploit Protection
In today's modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been…
Read more >Managing Web Application Security Computer Science Essay
Changes in business environments and the advances in web technologies have made the services of corporate, public and private firms to be more widespread over the web by making use…
Read more >Matalan Architecture and Infrastructural Investigation
 Table of content Introduction of Organisation Collection of information Findings of Report Hardware & Software Operating Systems Networking Facilities Security issues Legal & Ethical Requirements Key Areas Systems Diagram…
Read more >Ipv4 Internet Protocol Security Features Computer Science Essay
There are many articles about IP v 4 and IP v 6 internet protocol and mostly of articles describes IPv6 more secure internet protocol, but I came across with one…
Read more >ISO 27001 Standard Summary
A blueprint of ISO 27001 There are no less than two forms of ISO/IEC 27001. The 2005 form and the 2013 adaptation. Both renditions are very comparative with some minor…
Read more >Issues in Protecting Rights and Copyrights
Each society throughout history has, and will be introduced to new ideas, inventions, and movements that benefit their communities. Yet, with those inventions will come ways for people to exploit…
Read more >IVR Cloud Migration Project
INTRODUCTION The primary objective of the IVR Cloud Migration Project is to Lift and Shift their working Applications into the AWS Cloud Environment. The Lift and Shift of the IVR…
Read more >Java Multithreaded Genetic Algorithm In Solving Computer Science Essay
Time table problem is a kind of scheduling problems with many variations. It defines a class of hard-to-solve constrained optimization problems of combinatorial nature (Bhaduri, 2009, p.289). Constraints are the…
Read more >Kafka V/s RabbitMQ Queuing Systems
Queuing systems are asynchronous in nature which are built to transfer the data from producer to consumer (mainly known as PUB-SUB model). This whole architecture is known as Message Oriented…
Read more >