Show simple item record

dc.contributor.authorHossain, Md.Mainul
dc.contributor.authorBala, Chinmoy Krishna
dc.contributor.authorZious, Md.Tariq Ibne
dc.contributor.authorKhatun, MST.Kulsum
dc.date.accessioned2025-01-16T10:06:50Z
dc.date.available2025-01-16T10:06:50Z
dc.date.issued2019-05-22
dc.identifier.urihttp://suspace.su.edu.bd/handle/123456789/1062
dc.description.abstractCommtnication of onfi&*iat &ta over the intrrnet is becming more fie$rcut evEry day. Individtlals and organizdions are sending &eir confidedial dda el€ctronisally. ft is also comtha hacksrs tflEst &ese netwdrs In currurt timeq prugins th€ data, softtrfle ard hdvre ftom vinrseo iq now morp rhsr ev€,r, a need and not just a conceflL \Mhai you need to know aborr nehrsl$ tbese days? \Mhx should ure do for networt security? How secr:rity is ioplw*d to e6ure a networ*l? How is sectnity mmagrd? Inthis Fp€r !ry€ try to adfu the ahve questiors and give m idea of where we & mw ditrg riliih ths seulriry of tfte n€ttrodt By using those teohniques, we can mily pened the hacker's track ftom our home md office rctrroctsen_US
dc.language.isoen_USen_US
dc.publisherSoanargaon Universiy (SU)en_US
dc.relation.ispartofseries;CSE-190011
dc.subjectThe Role of Cyber Security in Defending Computer Networksen_US
dc.titleThe Role of Cyber Security in Defending Computer Networksen_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record