London Metropolitan University (LMU)
Latest uploads at London Metropolitan University (LMU). Looking for notes at London Metropolitan University (LMU)? We have lots of notes, study guides and study notes available for your school.
-
131
-
2
-
5
Majors at London Metropolitan University (LMU)
Notes available for the following studies at London Metropolitan University (LMU)
-
A-Levels 1
-
Airline, Airport and Aviation Management 3
-
Art 1
-
BA ANTHROPOLOGY 2
-
Biomedical Science 2
-
Business management 6
-
Computer Networking and IT Security 2
-
Criminology and pyschology 3
-
Data Analytics 1
-
Health 1
-
International Relations and Diplomacy 1
-
Law 4
-
Level 3 1
-
Level 4 1
-
Linguistics 6
-
LLB Business Law 6
-
London Metropolitan University 30
-
MBA 1
-
MSc Computer Networking and Cyber Security 4
-
Networking and IT Security 1
-
Physics 1
-
Postgraduate 6
-
Psychology 26
Latest notes & summaries London Metropolitan University (LMU)
This is a coursework for my 1st yr assignment. In this coursework, I have developed a e-portfolio website using HTML, CSS and JavaScript. Inside the report, I have included good literature and culmination of professional documents and journals.
- Other
- • 44 pages's •
-
London Metropolitan University•Bsc Computer Networking and IT Security
Preview 1 out of 44 pages
This is a coursework for my 1st yr assignment. In this coursework, I have developed a e-portfolio website using HTML, CSS and JavaScript. Inside the report, I have included good literature and culmination of professional documents and journals.
This essay report is how to configure network switch for complex International travel agency company.
- Book & Paket-Deal
- Essay
- • 65 pages's •
-
London Metropolitan University•Switched Networks
-
Switched Networks Companion Guide • Cisco Networking Academy, Cisco Networking Aca• ISBN 9780133476446
-
MSC Computer Network and Cyber Security full course assignment.• By ahmedali3
Preview 4 out of 65 pages
This essay report is how to configure network switch for complex International travel agency company.
Instructions
Plan, design a physical topology and implement the complex International Travel Agency (ITA) EIGRP network based on the above diagram and following specifications. Implement the design on the lab set of routers. Verify that all configurations are operational and functioning according to the guidelines.
- Book & Paket-Deal
- Essay
- • 58 pages's •
-
London Metropolitan University•Network Routing Protocols
-
OSPF: A Network Routing Protocol • Phani Raj Tadimety• ISBN 9781484214107
-
MSC Computer Network and Cyber Security full course assignment.• By ahmedali3
Preview 4 out of 58 pages
Instructions
Plan, design a physical topology and implement the complex International Travel Agency (ITA) EIGRP network based on the above diagram and following specifications. Implement the design on the lab set of routers. Verify that all configurations are operational and functioning according to the guidelines.
This report covers two parts, scanning process and SQL injection process.

Scanning (You must use a network scanner like Nmap to perform a scan on target web/application and include your findings, open ports, applications, operating systems, etc.)

Use SQLMAP to exploit the vulnerabilities based on the findings from above steps. You must elaborate the type of SQL Injection vulnerability exploited (Boolean-based Blind, Error-based, etc.) and provide
- Book & Paket-Deal
- Essay
- • 12 pages's •
-
London Metropolitan University•Security Auditing and Penetration Testing
-
SQL Injection Attack and Countermeasures • Subi Khan, R P Mahapatra• ISBN 9783659211836
-
MSC Computer Network and Cyber Security full course assignment.• By ahmedali3
Preview 2 out of 12 pages
This report covers two parts, scanning process and SQL injection process.

Scanning (You must use a network scanner like Nmap to perform a scan on target web/application and include your findings, open ports, applications, operating systems, etc.)

Use SQLMAP to exploit the vulnerabilities based on the findings from above steps. You must elaborate the type of SQL Injection vulnerability exploited (Boolean-based Blind, Error-based, etc.) and provide
This report provide an abstract section at the beginning and conclusion at the end. The appropriate background is delivered as an introduction in the topic area of interest. It then present an analysis over its technical content in depth looking at relevant issues concerned and demonstrate in-depth knowledge in the topic area of interest by examples and case studies, such as an organisation’s information security risk assessment, firewall security policy design, information security toolkit us...
- Book & Paket-Deal
- Essay
- • 11 pages's •
-
London Metropolitan University•Cyber Security Management
-
Cyber Security Standards, Practices and Industrial Applications • Junaid Ahmed Zubairi, Athar Mahboob• ISBN 9781609608514
-
MSC Computer Network and Cyber Security full course assignment.• By ahmedali3
Preview 2 out of 11 pages
This report provide an abstract section at the beginning and conclusion at the end. The appropriate background is delivered as an introduction in the topic area of interest. It then present an analysis over its technical content in depth looking at relevant issues concerned and demonstrate in-depth knowledge in the topic area of interest by examples and case studies, such as an organisation’s information security risk assessment, firewall security policy design, information security toolkit us...
These notes are from the first lecture of this class. The notes are a combination of explanations of what conflict resolution is, different theories, as well as short hand for when I'm trying to keep up with my lecturer. However, all should be clear and easy to understand. It's 5 pages, and touches slightly on the different theories and how they class Conflict resolution. These notes would help if you're writing an essay explaining what Conflict resolution is, who it affects, who plays a role...
- Book
- Class notes
- • 6 pages's •
-
London Metropolitan University•Conflict Resolution and Peace Building
-
Contemporary Conflict Resolution • Oliver Ramsbotham, Tom Woodhouse• ISBN 9780745632131
Preview 2 out of 6 pages
These notes are from the first lecture of this class. The notes are a combination of explanations of what conflict resolution is, different theories, as well as short hand for when I'm trying to keep up with my lecturer. However, all should be clear and easy to understand. It's 5 pages, and touches slightly on the different theories and how they class Conflict resolution. These notes would help if you're writing an essay explaining what Conflict resolution is, who it affects, who plays a role...
work
- Essay
- • 6 pages's •
-
London Metropolitan University•psychology
Preview 2 out of 6 pages
work
work
- Essay
- • 10 pages's •
-
London Metropolitan University•psychology
Preview 2 out of 10 pages
work
work
- Essay
- • 29 pages's •
-
London Metropolitan University•psychology
Preview 3 out of 29 pages
work
work
- Essay
- • 12 pages's •
-
London Metropolitan University•psychology
Preview 2 out of 12 pages
work