SlideShare une entreprise Scribd logo
1  sur  15
Cyber Crimes and Forensics
Rashmi Ranjan Nath (U113103)
Ravi Kumar Garg (U113104)
Rosali Priyadarshini (U113105)
Saswat Mohapatra (U113106)
Saurabh Thacker (U113107)
Sayan Sambit (U113108)
Computer viruses
Denial-of-service attacks
Malware (malicious code)
Introduction …Cyber Crimes and Forensic Techniques
Types Of Cyber Crimes
Cyber stalking
Fraud and identity theft
Information warfare
Phishing scams
Cyber terrorism
Cyber warfare
Digital forensics
Computational
forensics
Forensic intelligence
Mobile device
forensics
Introduction …Cyber Crimes and Forensic Techniques
Forensic Techniques
Business Implications…
Business Implications…
% Expense on restoring systems post data breach
Bank Fraud Cases and Recovery
Business Implications…
Cyber crimes in India…
0
2
7
2
0
3
1
4
3
1
9
9
158
188
259
259
90
146
118
282
1
1
6
21
3
8
5
19
21
7
17
5
2009
2010
2011
2012
Cyber Crimes registered during 2009-2012
iii)Currency/stamps ii) Tampering
i) Property Mark Counterfeiting
Criminal breach of trust/fraud Forgery
Destruction of electronic evidence False electronic evidence
Offences by/against public servant
Cyber crimes in India… Measures Taken
India’s first Cyber Forensic Laboratory (CFL) has been set up in Tripura, an
official said Monday. The lab, established at the Tripura High Court will
provide court case related information.
“A National Judicial Data Grid (NJDG) is being developed under the
Supreme Court’s supervision. All information about legal services, court
cases and judicial actions would be available from the NJDG,”
“So far, 13,000 judicial officers, including judges, have been trained about
the e-court system and to equip them with the ongoing modernization of
legal services”
“With this new system of trial and administrative works, the litigants will
be immensely benefited. It will save both time and money to get quick
justice and prompt disposal of cases,”
Major Antivirus Vendors
Major Players and their market share…
Market share and change from previous years
Major Players and their market share…
Global spending on cyber security products and services is expected
to exceed $71 billion by 2014, according to Gartner (IT), an
information technology research and advisory firm.
Top 5 Cyber security vendors
Major Players and their market share…
NAME ANNUAL REVENUE
5 YEAR AV. SALES
GROWTH
Check Point
Software Technologies (CHKP) $1.25B 12%
Sourcefire (FIRE) $165.65M 22.56%
Fortinet (FTNT) $433.58M 19.14%
Symantec (SYMC) $6.72B 8.60%
Websense (WBSN) $364.18M 5%
Conclusion…
• Cyber crime is increasing at a rapid rate
• Companies and Consumers both need to be aware of
what cyber crime is about and take the necessary
precautions.
• This also provides opportunities for network security
and antivirus providers
References…
http://ncrb.nic.in/
http://www.umuc.edu/globalmedia/upload/Spring2013-Achiever.pdf
http://en.wikipedia.org/wiki/Cyber_crimes
http://en.wikipedia.org/wiki/Cyber_security
http://en.wikipedia.org/wiki/Forensic_science
http://www.opswat.com/about/media/reports/antivirus-december-
2012
http://www.minyanville.com/sectors/technology/articles/CHKP-
FIRE-FTNT-GUID-SYMC-
WBSN/4/19/2012/id/40357?page=full&refresh=1
Questions and Answers
Thank You !!!

Contenu connexe

Tendances

Blockchain voting patent in the usa
Blockchain voting patent in the usaBlockchain voting patent in the usa
Blockchain voting patent in the usaBlockchain Council
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming Black Duck by Synopsys
 
Nanopayments - Fuel for a Machine-To-Machine Economy | Meinhard Benn
Nanopayments - Fuel for a Machine-To-Machine Economy | Meinhard BennNanopayments - Fuel for a Machine-To-Machine Economy | Meinhard Benn
Nanopayments - Fuel for a Machine-To-Machine Economy | Meinhard BennBlockchain Conferences
 
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021Nicholas Tancredi
 
Apla presentation (short version)
Apla presentation (short version)Apla presentation (short version)
Apla presentation (short version)Nikolay Syusko
 
Mircod Short Deck
Mircod Short DeckMircod Short Deck
Mircod Short DeckMircod
 
Maximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, AffordablyMaximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, Affordably Intelligent Software Solutions
 
Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)
Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)
Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)Turing Fest
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysForgeRock
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesKavitha Gupta, CIPP-Asia
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecRapidSSLOnline.com
 
Features of blockchain voting
Features of blockchain votingFeatures of blockchain voting
Features of blockchain votingSatyamAnand32
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with ForterSimplifilm
 

Tendances (20)

AI+Blockchain+IoT Convergence AT A Glance
AI+Blockchain+IoT Convergence AT A GlanceAI+Blockchain+IoT Convergence AT A Glance
AI+Blockchain+IoT Convergence AT A Glance
 
Blockchain voting patent in the usa
Blockchain voting patent in the usaBlockchain voting patent in the usa
Blockchain voting patent in the usa
 
E - comerce
E - comerceE - comerce
E - comerce
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Nanopayments - Fuel for a Machine-To-Machine Economy | Meinhard Benn
Nanopayments - Fuel for a Machine-To-Machine Economy | Meinhard BennNanopayments - Fuel for a Machine-To-Machine Economy | Meinhard Benn
Nanopayments - Fuel for a Machine-To-Machine Economy | Meinhard Benn
 
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
 
Apla presentation (short version)
Apla presentation (short version)Apla presentation (short version)
Apla presentation (short version)
 
Mircod Short Deck
Mircod Short DeckMircod Short Deck
Mircod Short Deck
 
Maximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, AffordablyMaximizing Your Own Crime Fighting Capabilities, Affordably
Maximizing Your Own Crime Fighting Capabilities, Affordably
 
Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)
Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)
Susan Ramonat — Blockchain Unraveled (Turing Fest 2018)
 
5 Steps to Get Our Rules Right
5 Steps to Get Our Rules Right5 Steps to Get Our Rules Right
5 Steps to Get Our Rules Right
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
Features of blockchain voting
Features of blockchain votingFeatures of blockchain voting
Features of blockchain voting
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
The information technology act,2000
The information technology act,2000The information technology act,2000
The information technology act,2000
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 

En vedette

Technology timeline
Technology timelineTechnology timeline
Technology timelineHaley101
 
презентация1
презентация1презентация1
презентация1yulyalove
 
presenting report bahasa inggris
presenting report bahasa inggrispresenting report bahasa inggris
presenting report bahasa inggrisAris Khinuzuka
 
Sistem pemerintahan pusat pkn
Sistem pemerintahan pusat pknSistem pemerintahan pusat pkn
Sistem pemerintahan pusat pknAris Khinuzuka
 
KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1
KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1
KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1Aris Khinuzuka
 
Busiest airport flight data analysis
Busiest airport flight data analysisBusiest airport flight data analysis
Busiest airport flight data analysissayansambit
 
IPA AMDAL BIDANG KESEHATAN
IPA AMDAL BIDANG KESEHATANIPA AMDAL BIDANG KESEHATAN
IPA AMDAL BIDANG KESEHATANAris Khinuzuka
 
smart card and typrs of smart card
smart card and typrs of smart cardsmart card and typrs of smart card
smart card and typrs of smart cardAL Rehman
 
what is HRM and histroy of hrm
what is HRM and histroy of hrmwhat is HRM and histroy of hrm
what is HRM and histroy of hrmAL Rehman
 
Parabola xii pm 1 kelompok sudut istimewa MATEMATIKA
Parabola xii pm 1 kelompok sudut istimewa MATEMATIKAParabola xii pm 1 kelompok sudut istimewa MATEMATIKA
Parabola xii pm 1 kelompok sudut istimewa MATEMATIKAAris Khinuzuka
 
Presentasi kewirausahaan
Presentasi kewirausahaanPresentasi kewirausahaan
Presentasi kewirausahaanAris Khinuzuka
 
Management information system and types
Management information system and typesManagement information system and types
Management information system and typesAL Rehman
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
Ubaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR departmentUbaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR departmentAL Rehman
 
Units 1, 16, 29 Assignment Brief
Units 1, 16, 29 Assignment BriefUnits 1, 16, 29 Assignment Brief
Units 1, 16, 29 Assignment BriefZaxapias
 

En vedette (20)

Technology timeline
Technology timelineTechnology timeline
Technology timeline
 
презентация1
презентация1презентация1
презентация1
 
john steven diego and joel presentation
john steven diego and joel presentationjohn steven diego and joel presentation
john steven diego and joel presentation
 
Presentase ipa
Presentase ipaPresentase ipa
Presentase ipa
 
presenting report bahasa inggris
presenting report bahasa inggrispresenting report bahasa inggris
presenting report bahasa inggris
 
KEWIRAUSAHAAN
KEWIRAUSAHAANKEWIRAUSAHAAN
KEWIRAUSAHAAN
 
Sistem pemerintahan pusat pkn
Sistem pemerintahan pusat pknSistem pemerintahan pusat pkn
Sistem pemerintahan pusat pkn
 
Ipa daur karbon
Ipa daur karbonIpa daur karbon
Ipa daur karbon
 
KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1
KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1
KEWIRAUSAHAAN Bab 5 administrasi usaha xii pm 1
 
Busiest airport flight data analysis
Busiest airport flight data analysisBusiest airport flight data analysis
Busiest airport flight data analysis
 
IPA AMDAL BIDANG KESEHATAN
IPA AMDAL BIDANG KESEHATANIPA AMDAL BIDANG KESEHATAN
IPA AMDAL BIDANG KESEHATAN
 
smart card and typrs of smart card
smart card and typrs of smart cardsmart card and typrs of smart card
smart card and typrs of smart card
 
what is HRM and histroy of hrm
what is HRM and histroy of hrmwhat is HRM and histroy of hrm
what is HRM and histroy of hrm
 
Parabola xii pm 1 kelompok sudut istimewa MATEMATIKA
Parabola xii pm 1 kelompok sudut istimewa MATEMATIKAParabola xii pm 1 kelompok sudut istimewa MATEMATIKA
Parabola xii pm 1 kelompok sudut istimewa MATEMATIKA
 
Presentasi kewirausahaan
Presentasi kewirausahaanPresentasi kewirausahaan
Presentasi kewirausahaan
 
Management information system and types
Management information system and typesManagement information system and types
Management information system and types
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Ubaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR departmentUbaid ur rehman final internship report on NBP HR department
Ubaid ur rehman final internship report on NBP HR department
 
Units 1, 16, 29 Assignment Brief
Units 1, 16, 29 Assignment BriefUnits 1, 16, 29 Assignment Brief
Units 1, 16, 29 Assignment Brief
 

Similaire à Cyber Crimes Forensics

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIAIRJET Journal
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDPranav Shah
 
Digital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdfDigital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdfGeeta Adhikari
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
Smart cities - Open to cyber attacks
Smart cities - Open to cyber attacksSmart cities - Open to cyber attacks
Smart cities - Open to cyber attacksRohan Patil
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 

Similaire à Cyber Crimes Forensics (20)

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdfDigital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdf
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Smart cities - Open to cyber attacks
Smart cities - Open to cyber attacksSmart cities - Open to cyber attacks
Smart cities - Open to cyber attacks
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 

Dernier

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Dernier (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Cyber Crimes Forensics