Phishing is the act of attempting to acquire information such as username, password and credit card details as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites ,auction sites, online payment process or IT administrators are commonly used to lure the unsuspecting public .Phishing emails may contain links to websites that are infected with malware.A Phishing technique was described in details in 1987 and the first recorded use of the term “Phishing” was made in 1995.A Phishing was described in details, in a paper and presentation delivered to the International HP users Group , Interex.
Archive for 2013-08-11
SOFTWARE REUSE SEMINAR PPT FREE DOWNLOAD
by
Santu Das
Software reuse is the process of implementing or updating software systems using existing software components.To explain the benefits of software reuse and some reuse problems.To discuss several different ways to implement.To discuss cots reuse.To describe the development of software product lines.Horizontal Reuse:Horizontal reuse to software components used across a wide variety of applications.Vertical Reuse:Vertical Reuse the reuse of system functional areas, or domains, that can be used by a family of systems with similar functionality.Higher quality products.Less development time.Higher scheduling accuracy.Reliability.The applicability of generator reuse is limited to a small number of application domains.
Powered by Blogger.