Collection of latest seminar topics of computer science. Download full latest seminar topics of computer science in doc, pdf or ppt format.
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator .
ZigBee is a wireless technology designed for control and sensor networks. It defines a set of communication protocols for low-data-rate Short-range wireless networking.
Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.
A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the "boot.
The Wireless USB is the first the high speed Personal Wireless Interconnect. Wireless USB will build on the success of wired USB, bringing USB technology into the wireless future.
Open Source Tripwire is a free software security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems.
Steganography is the art and science of communicating in a way which hides the the existence of the secret message communication. It aims to hide information /covered writing. Information to be protected.
Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on (IP) network. Microsoft.
Satrack is basically an acronym for satellite tracking system which uses a GPS i.e Global Positioning System for sending the signals to the missile launched in the space.
Location-aware computing involves the automatic tailoring of information and services based on the current location of the user. We have designed and implemented Rover, a system that enables location-...
Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.
An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or application programs.
Today IP Telephony is a very powerful and economical communication options. IP telephony is the integration and convergence of voice and data networks, services, and applications.
The Hurd is built on top of CMU's Mach 3.0 kernel and uses Mach's virtual memory management and message-passing facilities.
The Human-Computer Interface (HCI) deals with the methods by which computers and their users communicate. It is the process of designing interface software so that computers are pleasant, easy to use.
A GPU is a microprocessor that has been designed specifically for the processing of 3D graphics. The processor is built with integrated transform, lighting, triangle setup/clipping, and rendering engines, capable of handling millions of math.
These application suites are often a collection of multiple independent subsystems. Despite functional variations between these applications often they require to communicate with each other and also sometimes they need to share a common state.
Extreme Programming (XP) is actually a deliberate and disciplined approach to software development. The methodology is designed to deliver the software your customer needs when it is needed.
The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants.
The authenticity of many legal, financial, and other documents is determined by the presence or absence of an authorized handwritten signature. The recipient of the signed document can verify the claimed identity of the sender using the signature.