File Download Portal
Advance security in computing
ASC Practical Manual
Content for paper
part 1 installation VID
part 2 installation VID
part 3 VID
ASC-1 & 2 -Wireshark Practicals Manual
ASC-3, 4 & 5-DES,RSA,AES Practical Manual
Asc-3-Implementing Deffie Hellman Key exchange algorithm code file
ASC-4-Performing an AES Encryption and Decryption code file.
ASC-5-Implement RSA Algorithm code file.
ASC-6-Tools to perform Behavioral analysis of Malware- 1.Process Hacker 2.Process Monitor (procmon) 3.Microsoft Network Monitor 4. Autorun Manual
ASC-7- SQL Injection Manual
ASC-8-Vulnerability Testing Manual
ASC-9-XSS Attack Manual
ASC-10-MITM Attack Manual
cloud computing
CC Practical Journal
Content for paper-CC
CC-1-Implementing Failover Cluster on Windows
CC-2-VMware ESXi server with vsphere client
CC-3-Implementing Google App Engine
CC-4-Implementing IaaS using Eucalyptus
CC-5-Manage XenServer with XenCenter
CC-6-Implementing Hypervisor
CC-7-Implementing OpenNebula
CC-8-Implementing Amazon Web Service
CC-8- code of Newfile & Fibonacci
web mining
wm practical Journal
wm content for paper
Write a program for Pre-processing of Text Document A1)-Stop Word Removal.
Prac-1b-Tokenization and Filtering
Prac-2-Write a program to implement Boolean retrieval model for the given document.
Prac-3-Write a program to implement Vector Space Model and compute cosine Similaritybetween a query and documents.
Prac-4-Write a program to detect spam keywords (keyword stuffing) in web content using word frequency analysis.
Prac-5-Write a program to create an inverted index for a collection of documents.
Prac-6-Write a program to perform Text summarization using Extractive(LexRank) and Abstractive (Transformers) methods.
Prac-7-Write a program to identify opinion spam in user reviews.
Introduction to DATA Science
IDS practical Manual
Category B
Category C
Category D
Category E