International Conference on Network Infrastructure and Management Systems , INTERFACE 2011 (INTERFACE2011)
Venue: DEP-II Hall
|Event Date/Time: Dec 16, 2011||End Date/Time: Dec 17, 2011|
|Registration Date: Dec 05, 2011|
|Early Registration Date: Nov 30, 2011|
|Paper Submission Date: Nov 01, 2011|
Original and unpublished papers are invited from researchers, academicians and professionals. Authors are invited to send a copy of full length paper by email. The paper must follow IEEE format. The maximum length of paper is 6 pages including figures and references. After expert review, the author may be asked to submit the camera ready paper. Papers should be submitted electronically first and after acceptance send the camera ready copy electronically as well as hard copy, registration form and bank draft. Submit your paper in pdf format by sending it as an email attachment to firstname.lastname@example.org
Call for Workshop
The academicians, researchers and professional are invited to deliver talk on the Information Security. Esteemed people will deliver the lectures on the Computer Networking & Security in the workshop. The Participants can register for the 5 days workshop.
Facilities for Workshop
â€¢ E-Classroom for conducting sessions
â€¢ Participation certificate will be issued to all participants.
â€¢ CD with Course Material
â€¢ Teaching Faculty from Degree and Diploma Engineering Colleges
â€¢ Faculties from AICTE approved Engineering Colleges/Institutes.
â€¢ Network Security Researchers, Research Scholars, and Engineers& Technocrats from Industry, Banking and Police department.
OBJECTIVE of workshop:
This Programme is designed for Participants with a good graduate background in computer science, information systems or other computing-related subject, with some knowledge of computer networks.. While information system in an organization has become a valuable asset of the organization, attempts to compromise it have also increased. The network attack attempts to compromise the confidentiality, integrity, availability, or to bypass security mechanism of a computer or network are increased. Interface 2011 is designed to cover relevant skills, secure software and hardware technologies, and the more practical studies that underpin everyday practice in Information Security. Participants will gain an understanding of the threats to business networks, information systems and servers. They learn to administer and manage business-critical distributed applications and configure relevant security options. They will be exposed to industry standard software and hardware systems for security management. The programme also provide hands-on training in current industry-standard tools for implementing security such as access control, authentication, encryption and key management, network attacks and defense mechanism, ethical hacking and forensic analysis. Participants are therefore able to contribute quickly to the well-being of corporate IT and informational assets. In addition, it ensures that Participants have a basic understanding of the international standards and legal and regulatory requirements that pertain to computer security in different nations.
â€¢ TCP/IP Suit & Administration
â€¢ Network Design using CISCO Products
â€¢ Network Programming using Java
â€¢ Cryptography & Implementation using Java
â€¢ Computer Security : Program Security, Database
Security, Operating System Security
â€¢ Network Security
â€¢ Network attacks & Defense Mechanism
â€¢ Ethical Hacking Engineering
â€¢ Digital Forensic Analysis
â€¢ Intrusion Detection & Protection Systems
â€¢ Firewall and its implementation
â€¢ Demonstration on various Network Security & Products& Security Tools