Author: Syed Ubaid Ali Jafri


Storage area network

Storage area network

Complete configuration of SAN using ESXI Environment and In...


Syed Ubaid Ali jafri - CISSP Exam Guide by Eric Conrad,Seth Misenar

Syed Ubaid Ali jafri - CISSP Exam Guide by Eric Conrad,Seth Misenar

Certified Information Systems Security Professional (CISSP)...


Syed Ubaid Ali Jafri - Cryptography Techniques

Syed Ubaid Ali Jafri - Cryptography Techniques

Syed Ubaid Ali Jafri has described cryptography technique i...


Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates

Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates

Syed Ubaid Ali Jafri Informed Information Security Students...

Why Information Technology is still an issue for Non techni...


Securing wireless network

Securing wireless network

When setting up and maintaining Wi-Fi home networks, consid...


OSI Layered based attacks

OSI Layered based attacks

This Document highlights the information that contains in a...


Network security over ethernet

Network security over ethernet

Ethernet-based and other networks face security challenges...


LAN Security

LAN Security

The Ethernet LAN has many security weaknesses when facing a...


IP Security over VPN

IP Security over VPN

Virtual private networks (VPNs) are generally considered to...

Internet Information Services (IIS) – formerly called Inter...


Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri

Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri

Final year project ideas and Aims related to computer scien...


Data Hiding (An Approach towards Stegnography)

Data Hiding (An Approach towards Stegnography)

This Document describes how a content can be hide using adv...


Data calling from web to C#

Data calling from web to C#

Retrieving Data from a web into some Programming is complex...