Posts

Showing posts from 2020

PEP DATA STRUCTURE PRACTICE

Image
DATA STRUCTURE PEP PRACTICE :  Data Structure  is a way to store and organize  data  so that it can be used efficiently .  For example, we can store a list of items using array,linked list,stack,queue,tree,graph. 1. Array : In this topic we will learn   = > --->Array Insertion   --->Array Deletion --->Array Rotation                                                                         Array Insertion   #include<iostream> using namespace std; int main() { int a[50],size,num,pos; cin>>size; if(size>50) { cout<<"overflow!!"<<endl; }else { for(int i=0;i<size;i++) { cin>>a[i]; } cin>>num>>pos; for(int i=size-1;i>=pos-1;i--) { a[i+1]=a[i]; } a[pos-1]=num; size++; for(int i=0;i<size;i++) { cout<<a[i]<<" "; } } } -----------------------------------------C omplexity(worst case) : O(n) --------------

INT 244 :: SECURING COMPUTING SYSTEMS

Image
   Unit I Introduction to Ethical Hacking: Hacking Evolution, What Is an Ethical Hacker?, Ethical hacking and Penetration testing, Hacking methodologies System Fundamentals: Fundamental of computer networks, Exploring TCP/IP ports, Understanding network devices, Proxies, Firewall and Network Security, Knowing Operating Systems (Windows, Mac, Android and Linux) Cryptography: History of cryptography, Symmetric cryptography, Asymmetric cryptography, Understanding Hashing, Issues with cryptography, Application of cryptography (IPsec, PGP, SSl) Unit II Footprinting: What is Footprinting, Threats Introduced by Footprinting, The Footprinting process, Using (Search engine, Google hacking, Social networking and Financial services) Information gathering Scanning: What is Scanning, Types of Scans, Family tree of Scans, OS fingerprinting, Countermeasure, Vulnerability Scanning and Using Proxies Unit III Enumeration: What is Enumeration, Windows Enumeration, Enumeration with SNMP, LDAP and Dir