SlideShare une entreprise Scribd logo
1  sur  13
KERBEROS
k.RAja gangadhar
14A81A0577
cse-B
INDEX_____________________________
___
 Introduction
 History & Development
 Need
 Working
 Applications
 Weakness
 climax
INTRODUCTION…………….____________
 Network authentication protocol.
 Developed at MIT in the mid 1980s.
 A secret key based service for providing authentication in open
networks.
 Provides strong authentication for client-server applications.
HISTORY & DEVELOPMENT______________
 Steve Miller and Clifford Neuman designed the
primary Kerberos version.
 Versions 1–3 occurred only internally at MIT as part
of project Athena.
 Windows 2000 was Microsoft's first system to
implement Kerberos security standard.
 Version 5, designed by John Kohl and Clifford
Neuman, appeared in 1993 .
NEED
________________________________
• The primary goal of kerberos is to elimate the transmission of
unencrypted passwords across the networks.
• Sending usernames and passwords in the clear jeopardizes the
security of network.
• Each time a password is sent in clear , there is a chance for
interception.
WORKING___________________________
__
WORKING___________________________
__
Abbreviations Used:
AS Authentication Server.
KDC Key Distribution Center.
TGS Ticket Granting Server.
SS Service Server.
TGT Ticket Granting Ticket.
WORKING:VIDEO
DISADVANTAGES_____________________
 Compromise of central server will compromise all
users' secret keys. If stolen, TGT can be used to
access network services of others.
 Kerberos only provide authentication only for
clients and services.
 Vulnerable to users making poor password
choices.
ADVANTAGES
 Passwords are never sent across the network
unencrypted.
 Tickets have a limited lifetime.
 Authentication through the AS only has to happen
once.
 Sharing secret keys is more efficient than public-
keys.
CLIMAX____________________________
__
 Kerberos is an authentication service using
convention encryption.
 Kerberos the solution to network security is a
protocol designed to provide centralized
authentication whose function is to authenticate
user to server and server to user.
Kerberos
Kerberos

Contenu connexe

Tendances

Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authenticationSuraj Singh
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication ProtocolBibek Subedi
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4koolkampus
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to KerberosShumon Huque
 
Kerberos presentation
Kerberos presentationKerberos presentation
Kerberos presentationChris Geier
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh rajDBNCOET
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolIAEME Publication
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 

Tendances (20)

Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 
Kerberos (1)
Kerberos (1)Kerberos (1)
Kerberos (1)
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Kerberos
KerberosKerberos
Kerberos
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Kerberos presentation
Kerberos presentationKerberos presentation
Kerberos presentation
 
Rakesh raj
Rakesh rajRakesh raj
Rakesh raj
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Ch15
Ch15Ch15
Ch15
 
SSO with kerberos
SSO with kerberosSSO with kerberos
SSO with kerberos
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocol
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos explained
Kerberos explainedKerberos explained
Kerberos explained
 
Ch14
Ch14Ch14
Ch14
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 

En vedette

MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management JNU Jaipur
 
How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?CodeFuel
 
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRSLa sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRSGlobal Water Initiative - West Africa
 
Revanth - Enterprise Engineer
Revanth - Enterprise EngineerRevanth - Enterprise Engineer
Revanth - Enterprise Engineerrevanth29115
 
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732Mariela B. Fioramonti
 
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife PhotographerDarnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife PhotographerDarnell L Hinton
 
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth BottomleyEldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth BottomleyIDS Knowledge Services
 
Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014gaona20
 
New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)fdiworlddental
 

En vedette (16)

MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management MBA + PGD - Risk and Insurance Management
MBA + PGD - Risk and Insurance Management
 
El IoT
El IoTEl IoT
El IoT
 
How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?How Do Users REALLY Behave Online?
How Do Users REALLY Behave Online?
 
IAE Certificate
IAE CertificateIAE Certificate
IAE Certificate
 
li-fi technology
li-fi technologyli-fi technology
li-fi technology
 
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRSLa sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
La sécurisation foncière des exploitants familiaux dans la zone de l’ODRS
 
Revanth - Enterprise Engineer
Revanth - Enterprise EngineerRevanth - Enterprise Engineer
Revanth - Enterprise Engineer
 
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
Cert Disertacion VACA MUERTA en CCIS - 02-09-15_20151006105732
 
Hope in hell
Hope in hell Hope in hell
Hope in hell
 
A modelo do deserto
A modelo do desertoA modelo do deserto
A modelo do deserto
 
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife PhotographerDarnell L Hinton Is An Enthusiastic Wildlife Photographer
Darnell L Hinton Is An Enthusiastic Wildlife Photographer
 
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth BottomleyEldis 20th Anniversary Workshop 2016: Ruth Bottomley
Eldis 20th Anniversary Workshop 2016: Ruth Bottomley
 
Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014Paulette_gaona_sociedad del conocimiento_201014
Paulette_gaona_sociedad del conocimiento_201014
 
New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)New materials for a post-Minamata era (Jirun Sun)
New materials for a post-Minamata era (Jirun Sun)
 
Castro jeimy-actividad-trabajo en casa
Castro jeimy-actividad-trabajo en casaCastro jeimy-actividad-trabajo en casa
Castro jeimy-actividad-trabajo en casa
 
Alg diag
Alg diag Alg diag
Alg diag
 

Similaire à Kerberos

Kerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraKerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraOmal Perera
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxssusere142fe
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...PROIDEA
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Continuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sContinuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sQAware GmbH
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Intro to the sel4 Microkernel
Intro to the sel4 MicrokernelIntro to the sel4 Microkernel
Intro to the sel4 MicrokernelMatthew Russell
 
Common types of networks(networking)
Common types of networks(networking)Common types of networks(networking)
Common types of networks(networking)welcometofacebook
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native AppsMicroservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native AppsAraf Karsh Hamid
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationKim Clark
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connectionsaibad ahmed
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connectionsaibad ahmed
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...YogeshIJTSRD
 

Similaire à Kerberos (20)

14 577
14 57714 577
14 577
 
Kerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraKerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal Perera
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
chaitraresume
chaitraresumechaitraresume
chaitraresume
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...infraxstructure: Emil Gągała  "Ludzie, procesy, technika – czy wirtualizacja ...
infraxstructure: Emil Gągała "Ludzie, procesy, technika – czy wirtualizacja ...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Continuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8sContinuous (Non-)Functional Testing of Microservices on K8s
Continuous (Non-)Functional Testing of Microservices on K8s
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Intro to the sel4 Microkernel
Intro to the sel4 MicrokernelIntro to the sel4 Microkernel
Intro to the sel4 Microkernel
 
Common types of networks(networking)
Common types of networks(networking)Common types of networks(networking)
Common types of networks(networking)
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native AppsMicroservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native Apps
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Anil Info
Anil InfoAnil Info
Anil Info
 
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...Simulations on Computer Network An Improved Study in the Simulator Methodolog...
Simulations on Computer Network An Improved Study in the Simulator Methodolog...
 

Plus de Chaitanya Ram (20)

14 599
14 59914 599
14 599
 
14 598
14 59814 598
14 598
 
14 595
14 59514 595
14 595
 
14 593
14 59314 593
14 593
 
14 587
14 58714 587
14 587
 
14 586
14 58614 586
14 586
 
14 585
14 58514 585
14 585
 
14 584
14 58414 584
14 584
 
14 583
14 58314 583
14 583
 
14 581
14 58114 581
14 581
 
14 576
14 57614 576
14 576
 
14 575
14 57514 575
14 575
 
14A81A0574
14A81A057414A81A0574
14A81A0574
 
14 572
14 57214 572
14 572
 
14 571
14 57114 571
14 571
 
14 570
14 57014 570
14 570
 
14 569
14 569 14 569
14 569
 
14 568
14 56814 568
14 568
 
14 567
14 56714 567
14 567
 
14 566
14 56614 566
14 566
 

Dernier

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Dernier (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Kerberos

Notes de l'éditeur

  1. vf