Cybercryptography: Applicable Cryptography for Cyberspace Security

Download Cybercryptography: Applicable Cryptography for Cyberspace Security PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 331972536X
Total Pages : 436 pages
Book Rating : 4.3/5 (197 download)

DOWNLOAD NOW!


Book Synopsis Cybercryptography: Applicable Cryptography for Cyberspace Security by : Song Y. Yan

Download or read book Cybercryptography: Applicable Cryptography for Cyberspace Security written by Song Y. Yan and published by Springer. This book was released on 2018-12-04 with total page 436 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Download Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1615207848
Total Pages : 408 pages
Book Rating : 4.6/5 (152 download)

DOWNLOAD NOW!


Book Synopsis Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering by : Nemati, Hamid R.

Download or read book Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering written by Nemati, Hamid R. and published by IGI Global. This book was released on 2010-08-31 with total page 408 pages. Available in PDF, EPUB and Kindle. Book excerpt: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Quantum Cryptography and the Future of Cyber Security

Download Quantum Cryptography and the Future of Cyber Security PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1799822559
Total Pages : 343 pages
Book Rating : 4.7/5 (998 download)

DOWNLOAD NOW!


Book Synopsis Quantum Cryptography and the Future of Cyber Security by : Chaubey, Nirbhay Kumar

Download or read book Quantum Cryptography and the Future of Cyber Security written by Chaubey, Nirbhay Kumar and published by IGI Global. This book was released on 2020-01-03 with total page 343 pages. Available in PDF, EPUB and Kindle. Book excerpt: The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

Cybersecurity Issues, Challenges, and Solutions in the Business World

Download Cybersecurity Issues, Challenges, and Solutions in the Business World PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1668458292
Total Pages : 305 pages
Book Rating : 4.6/5 (684 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity Issues, Challenges, and Solutions in the Business World by : Verma, Suhasini

Download or read book Cybersecurity Issues, Challenges, and Solutions in the Business World written by Verma, Suhasini and published by IGI Global. This book was released on 2022-10-14 with total page 305 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Download Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security PDF Online Free

Author :
Publisher :
ISBN 13 : 9781785399824
Total Pages : pages
Book Rating : 4.3/5 (998 download)

DOWNLOAD NOW!


Book Synopsis Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security by : Brij Gupta

Download or read book Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security written by Brij Gupta and published by . This book was released on 2016 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention.

Modern Cryptography for Cybersecurity Professionals

Download Modern Cryptography for Cybersecurity Professionals PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1838647791
Total Pages : 286 pages
Book Rating : 4.8/5 (386 download)

DOWNLOAD NOW!


Book Synopsis Modern Cryptography for Cybersecurity Professionals by : Lisa Bock

Download or read book Modern Cryptography for Cybersecurity Professionals written by Lisa Bock and published by Packt Publishing Ltd. This book was released on 2021-06-11 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen data Key FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook Description In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data. The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN). By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI. What you will learnUnderstand how network attacks can compromise dataReview practical uses of cryptography over timeCompare how symmetric and asymmetric encryption workExplore how a hash can ensure data integrity and authenticationUnderstand the laws that govern the need to secure dataDiscover the practical applications of cryptographic techniquesFind out how the PKI enables trustGet to grips with how data can be secured using a VPNWho this book is for This book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Download Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1522501061
Total Pages : 589 pages
Book Rating : 4.5/5 (225 download)

DOWNLOAD NOW!


Book Synopsis Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security by : Gupta, Brij

Download or read book Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security written by Gupta, Brij and published by IGI Global. This book was released on 2016-05-16 with total page 589 pages. Available in PDF, EPUB and Kindle. Book excerpt: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography

Download Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030745244
Total Pages : 257 pages
Book Rating : 4.0/5 (37 download)

DOWNLOAD NOW!


Book Synopsis Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography by : Satyanarayana Vollala

Download or read book Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography written by Satyanarayana Vollala and published by Springer Nature. This book was released on 2021-07-13 with total page 257 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Smart Grid and Internet of Things

Download Smart Grid and Internet of Things PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 303069514X
Total Pages : 548 pages
Book Rating : 4.0/5 (36 download)

DOWNLOAD NOW!


Book Synopsis Smart Grid and Internet of Things by : Yi-Bing Lin

Download or read book Smart Grid and Internet of Things written by Yi-Bing Lin and published by Springer Nature. This book was released on 2021-03-05 with total page 548 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume, SGIoT 2020, constitutes the refereed proceedings of the 4th EAI International Conference on Smart Grid and Internet of Things, SGIoT 2020, held in TaiChung, Taiwan, in December 2020. The IoT-driven smart grid is currently a hot area of research boosted by the global need to improve electricity access, economic growth of emerging countries, and the worldwide power plant capacity additions. The 40 papers presented were reviewed and selected from 159 submissions and present broad range of topics in wireless sensor, vehicular ad hoc networks, security, blockchain, and deep learning.

Cryptography and Steganography. A multilayer Data Security Approach

Download Cryptography and Steganography. A multilayer Data Security Approach PDF Online Free

Author :
Publisher : GRIN Verlag
ISBN 13 : 3346536009
Total Pages : 86 pages
Book Rating : 4.3/5 (465 download)

DOWNLOAD NOW!


Book Synopsis Cryptography and Steganography. A multilayer Data Security Approach by : Jagdish Chandra Patni

Download or read book Cryptography and Steganography. A multilayer Data Security Approach written by Jagdish Chandra Patni and published by GRIN Verlag. This book was released on 2021-11-10 with total page 86 pages. Available in PDF, EPUB and Kindle. Book excerpt: Document from the year 2021 in the subject Computer Science - IT-Security, grade: 2, , language: English, abstract: This book focuses on the implementation of Image steganography and modifying the existing technique to add more security to a normal steganography technique. The Book emphasizes various techniques used in steganography with methodology, algorithm, MAT LAB implementation and implementation in Java. There is data everywhere, in the form of images, text and audio/video files. Some data is very crucial or personal and needs to be kept confidential. For that reason, we have cryptography. Cryptography is the science of encrypting a message such that an unauthorized party cannot comprehend what that message means. Only those who possess the key can decrypt the message. There might be cases where just encrypting the information is not enough, since an encrypted message can raise suspicion. Steganography is the science of hiding a message completely inside another form of data so that the existence of the actual message is not revealed during communication. It is possible to hide the image in any of the digital formats whether it is images, videos or even audio files. Images are popular because they are really frequent on the internet and hence do not arouse suspicion. This book intends to give an overview cryptography with image steganography.

A Closer Look at Cybersecurity and Cryptanalysis

Download A Closer Look at Cybersecurity and Cryptanalysis PDF Online Free

Author :
Publisher :
ISBN 13 : 9781536181654
Total Pages : 114 pages
Book Rating : 4.1/5 (816 download)

DOWNLOAD NOW!


Book Synopsis A Closer Look at Cybersecurity and Cryptanalysis by : Ch. Rupa

Download or read book A Closer Look at Cybersecurity and Cryptanalysis written by Ch. Rupa and published by . This book was released on 2020-07-28 with total page 114 pages. Available in PDF, EPUB and Kindle. Book excerpt: A major concern in today's digital world is Security. Due to digitization, implementation of secure policies and procedures to ensure security became challenging issue. Also analyzing the strength of security algorithms or procedures is more important to avoid compromising of organizational assets. In this direction, this book explains the role of cryptanalysis in real world with practical examples. Cryptanalysis of various algorithms by using emerging technologies is explained which is helpful for reader/learner to implement innovative cryptanalysis schemes that assists to evaluate the existing cryptographic algorithms. This book also demonstrated different ways of evaluating the security of the system in the form of penetration testing. Tools for performing penetration testing is well illustrated with stepwise procedure which will give hands-on experience to the reader/audience. The role of data mining schemes in the context of intrusion detection system (IDS) is also illustrated. This book enlighten the use of IoT based security application in solving the social issues. Such demonstrated applications in this book will help readers/audiences to implement their own novel applications for addressing different societal issues.We consider all aforementioned features as the strength of this book. With this impression we ensures that all undergraduate and postgraduate students of any discipline will get a basic idea on cryptography, cryptanalysis, penetration testing tools, cyber security, IDS and IoT applications in securing today's digitalized world.

Multimedia Technologies in the Internet of Things Environment, Volume 3

Download Multimedia Technologies in the Internet of Things Environment, Volume 3 PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9811909245
Total Pages : 237 pages
Book Rating : 4.8/5 (119 download)

DOWNLOAD NOW!


Book Synopsis Multimedia Technologies in the Internet of Things Environment, Volume 3 by : Raghvendra Kumar

Download or read book Multimedia Technologies in the Internet of Things Environment, Volume 3 written by Raghvendra Kumar and published by Springer Nature. This book was released on 2022-04-04 with total page 237 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book proposes a comprehensive overview of the state-of-the-art research work on multimedia analysis in IoT applications. This is a third volume by editors which provides theoretical and practical approach in the area of multimedia and IOT applications and performance analysis. Further, multimedia communication, deep learning models to multimedia data, and the new (IOT) approaches are also covered. It addresses the complete functional framework in the area of multimedia data, IoT, and smart computing techniques. It bridges the gap between multimedia concepts and solutions by providing the current IOT frameworks, their applications in multimedia analysis, the strengths and limitations of the existing methods, and the future directions in multimedia IOT analytics.

Holistic Approach to Quantum Cryptography in Cyber Security

Download Holistic Approach to Quantum Cryptography in Cyber Security PDF Online Free

Author :
Publisher :
ISBN 13 : 9781032282701
Total Pages : 0 pages
Book Rating : 4.2/5 (827 download)

DOWNLOAD NOW!


Book Synopsis Holistic Approach to Quantum Cryptography in Cyber Security by : Shashi Bhushan

Download or read book Holistic Approach to Quantum Cryptography in Cyber Security written by Shashi Bhushan and published by . This book was released on 2022 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: "This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--

Applied Cryptography

Download Applied Cryptography PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119439027
Total Pages : 937 pages
Book Rating : 4.1/5 (194 download)

DOWNLOAD NOW!


Book Synopsis Applied Cryptography by : Bruce Schneier

Download or read book Applied Cryptography written by Bruce Schneier and published by John Wiley & Sons. This book was released on 2017-05-25 with total page 937 pages. Available in PDF, EPUB and Kindle. Book excerpt: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Cyber Defense Mechanisms

Download Cyber Defense Mechanisms PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1000171981
Total Pages : 978 pages
Book Rating : 4.0/5 (1 download)

DOWNLOAD NOW!


Book Synopsis Cyber Defense Mechanisms by : Gautam Kumar

Download or read book Cyber Defense Mechanisms written by Gautam Kumar and published by CRC Press. This book was released on 2020-09-08 with total page 978 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Cyber Security Practitioner's Guide

Download Cyber Security Practitioner's Guide PDF Online Free

Author :
Publisher : World Scientific
ISBN 13 : 9811204470
Total Pages : 597 pages
Book Rating : 4.8/5 (112 download)

DOWNLOAD NOW!


Book Synopsis Cyber Security Practitioner's Guide by : Hamid Jahankhani

Download or read book Cyber Security Practitioner's Guide written by Hamid Jahankhani and published by World Scientific. This book was released on 2020-02-24 with total page 597 pages. Available in PDF, EPUB and Kindle. Book excerpt: In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the minds of developers and scientists alike. This book aims to provide a reference on current and emerging issues on systems security from the lens of autonomy, artificial intelligence and ethics as the race to fight and prevent cyber crime becomes increasingly pressing.

Emerging Security Algorithms and Techniques

Download Emerging Security Algorithms and Techniques PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 9780815361459
Total Pages : 318 pages
Book Rating : 4.3/5 (614 download)

DOWNLOAD NOW!


Book Synopsis Emerging Security Algorithms and Techniques by : Khaleel Ahmad

Download or read book Emerging Security Algorithms and Techniques written by Khaleel Ahmad and published by CRC Press. This book was released on 2019 with total page 318 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Expert observers are optimistic that a new method called honey encryption will deter hackers by serving up fake data for every incorrect speculation of the key code. Then, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serve as a textbook/ reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, Electronics and Communication Engineering. Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serve as a textbook/ reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, Electronics and Communication Engineering. iplines of Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.