Notice Board

Intaglio 2016 @ IIM Calcutta. IEEE UPCON – 4th to 6th December, 2015. Intelligent Human Computer Interaction (IHCI), 2015....

THE CYCLE OF TECHNOLOGY

Since time memorial, humans have been improvising their surroundings for various objectives. Initially, the objectives were of basic nature...

BOTH NET AND ZERO

The most wonderful feature of the Internet is that it has minimized the information gap between symbolizes the...

Wireless charging

Wireless charging is a technique of transmitting electrical energy through air to a device for the purpose of energy...

Shortnote

Information Technology (IT) Vulnerability is a noteworthy concern nowadays in all circles of government as well as private sectors....

Cross Site Scripting (XSS)

Introduction to XSS Cross Site Scripting or simply XSS attacks are types of injection, in which malicious scripts are...

CYBER CRIME,WORM AND TERROR

While rapid technological developments have provided vast areas of new opportunity and potential sources of efficiency for organisations of...

© B'Cognizance !! INDIAN INSTITUTE OF INFORMATION TECHNOLOGY ALLAHABAD.
Home IIITA

IIITA accepts no liability for the content of this Website, or for the consequences of any actions taken on the basis of the information and Content provided.All content are solely owned by its respective authors. If in case of any issue occurs the write a mail to us at bcognizance@iiita.ac.in If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.