SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Harshavardhan Achrekar - Grad Student Umass Lowell presents Scenarios Authentication Patterns  Direct Authentication v/s Brokered Authentication Kerberos X.509 PKI STS
[object Object],[object Object],[object Object],[object Object],Introduction
Web Service Security Discussion includes:- ,[object Object],[object Object],[object Object],[object Object],[object Object]
Important Concepts ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Decision Criteria in Common Scenarios ,[object Object],[object Object],[object Object],[object Object]
Public Web Service Scenario ,[object Object],[object Object]
Distributor Web Service Profile ,[object Object],[object Object],[object Object],[object Object]
Candidate Solution
[object Object],[object Object],[object Object],[object Object],[object Object]
Intranet Web Service Scenario ,[object Object],[object Object]
Banking Application Requirements ,[object Object],[object Object],[object Object],[object Object]
Solution Approach
Candidate Solution
[object Object],[object Object],[object Object],[object Object],[object Object]
Internet B2B Scenario ,[object Object],[object Object]
Supply Chain Management Requirement ,[object Object],[object Object],[object Object],[object Object]
Solution Approach ,[object Object]
Summary of Security Decisions
Candidate Solution
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiple Internet Web Services Scenario ,[object Object],[object Object],[object Object],[object Object]
Travel Booking Application Requirement ,[object Object],[object Object],[object Object],[object Object]
Solution Approach
Candidate Solution
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Authentication Patterns ,[object Object],[object Object],[object Object],[object Object]
Authentication Patterns
Direct Authentication vs. Brokered Authentication ,[object Object],[object Object]
[object Object],[object Object],[object Object]
Authentication Decision Matrix
Brokered Authentication Options -  Security  Token Decision Matrix
Direct Authentication ,[object Object],[object Object],[object Object],[object Object]
Process ,[object Object],[object Object],[object Object]
Brokered Authentication ,[object Object],[object Object],[object Object],[object Object]
Process 1.The client submits    an authentication    request to the    authentication broker. 2. The authentication    broker contacts the    identity store to    validate the client’    credentials.
[object Object],[object Object],[object Object],[object Object]
Brokered Authentication- Kerberos ,[object Object],[object Object],[object Object],[object Object]
Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Process ,[object Object],[object Object],[object Object],[object Object]
Client Authenticates with Service Concentrate
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Brokered Authentication: X.509 PKI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Brokered Authentication: Security Token Service  (STS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectUbisecure
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization ModelsCSCJournals
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356IOSR Journals
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacksiosrjce
 
1000 ways to die in mobile oauth
1000 ways to die in mobile oauth1000 ways to die in mobile oauth
1000 ways to die in mobile oauthPriyanka Aash
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONJournal For Research
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
 
Msk security non linear authenticaiton
Msk security   non linear authenticaitonMsk security   non linear authenticaiton
Msk security non linear authenticaitonmsksecurity
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 

Was ist angesagt? (18)

SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
 
Access management
Access managementAccess management
Access management
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
1000 ways to die in mobile oauth
1000 ways to die in mobile oauth1000 ways to die in mobile oauth
1000 ways to die in mobile oauth
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
 
Contextual Authentication
Contextual AuthenticationContextual Authentication
Contextual Authentication
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
 
Zsun
ZsunZsun
Zsun
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 
Msk security non linear authenticaiton
Msk security   non linear authenticaitonMsk security   non linear authenticaiton
Msk security non linear authenticaiton
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 

Andere mochten auch

60 seconds
60 seconds60 seconds
60 secondsAna Luis
 
Audiência por Day Parts | Crianças e Adolescentes
Audiência por Day Parts | Crianças e AdolescentesAudiência por Day Parts | Crianças e Adolescentes
Audiência por Day Parts | Crianças e AdolescentesMichelle Sesterrem
 
Australia
AustraliaAustralia
Australiay3ehps
 
Employability deciding-planning and competing
Employability  deciding-planning and competingEmployability  deciding-planning and competing
Employability deciding-planning and competingGraduates Yorkshire
 
Wii目錄(中文版)
Wii目錄(中文版)Wii目錄(中文版)
Wii目錄(中文版)GameShop
 
El motor de combustio interna: conceptes fonamentals
El motor de combustio interna: conceptes fonamentalsEl motor de combustio interna: conceptes fonamentals
El motor de combustio interna: conceptes fonamentalschoriol
 
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviourRazib M
 
Lentera news ed. #21 Januari 2016
Lentera news  ed. #21 Januari 2016Lentera news  ed. #21 Januari 2016
Lentera news ed. #21 Januari 2016Ananta Bangun
 
Nesia power point by nesiaunited.com
Nesia power point by nesiaunited.comNesia power point by nesiaunited.com
Nesia power point by nesiaunited.comarisbudiman.com
 
Twitter Improves Seasonal Influenza Prediction
Twitter Improves Seasonal Influenza PredictionTwitter Improves Seasonal Influenza Prediction
Twitter Improves Seasonal Influenza PredictionHarshavardhan Achrekar
 
Wealthbuilder.ie introduction
Wealthbuilder.ie introductionWealthbuilder.ie introduction
Wealthbuilder.ie introductionWealthbuilder.ie
 
Argela tanıtım bt ihracat toplantısı_2014
Argela tanıtım bt ihracat toplantısı_2014Argela tanıtım bt ihracat toplantısı_2014
Argela tanıtım bt ihracat toplantısı_2014Mustafa Kuğu
 
Tengo ganas det i
Tengo ganas det iTengo ganas det i
Tengo ganas det imiriam_98
 
Itil v3 service strategy
Itil v3 service strategyItil v3 service strategy
Itil v3 service strategyyulhendri_asman
 

Andere mochten auch (20)

60 seconds
60 seconds60 seconds
60 seconds
 
Audiência por Day Parts | Crianças e Adolescentes
Audiência por Day Parts | Crianças e AdolescentesAudiência por Day Parts | Crianças e Adolescentes
Audiência por Day Parts | Crianças e Adolescentes
 
Australia
AustraliaAustralia
Australia
 
Employability deciding-planning and competing
Employability  deciding-planning and competingEmployability  deciding-planning and competing
Employability deciding-planning and competing
 
Wii目錄(中文版)
Wii目錄(中文版)Wii目錄(中文版)
Wii目錄(中文版)
 
Keeping faith alive
Keeping faith aliveKeeping faith alive
Keeping faith alive
 
El motor de combustio interna: conceptes fonamentals
El motor de combustio interna: conceptes fonamentalsEl motor de combustio interna: conceptes fonamentals
El motor de combustio interna: conceptes fonamentals
 
Jesus
JesusJesus
Jesus
 
Erti transformasi
Erti transformasiErti transformasi
Erti transformasi
 
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviour
 
Cta u6 - 3er grado - sesion 03
Cta   u6 - 3er grado - sesion 03Cta   u6 - 3er grado - sesion 03
Cta u6 - 3er grado - sesion 03
 
Lentera news ed. #21 Januari 2016
Lentera news  ed. #21 Januari 2016Lentera news  ed. #21 Januari 2016
Lentera news ed. #21 Januari 2016
 
Presentation egrek
Presentation egrekPresentation egrek
Presentation egrek
 
Nesia power point by nesiaunited.com
Nesia power point by nesiaunited.comNesia power point by nesiaunited.com
Nesia power point by nesiaunited.com
 
Twitter Improves Seasonal Influenza Prediction
Twitter Improves Seasonal Influenza PredictionTwitter Improves Seasonal Influenza Prediction
Twitter Improves Seasonal Influenza Prediction
 
Wealthbuilder.ie introduction
Wealthbuilder.ie introductionWealthbuilder.ie introduction
Wealthbuilder.ie introduction
 
Argela tanıtım bt ihracat toplantısı_2014
Argela tanıtım bt ihracat toplantısı_2014Argela tanıtım bt ihracat toplantısı_2014
Argela tanıtım bt ihracat toplantısı_2014
 
Tengo ganas det i
Tengo ganas det iTengo ganas det i
Tengo ganas det i
 
Informe para blog
Informe   para blogInforme   para blog
Informe para blog
 
Itil v3 service strategy
Itil v3 service strategyItil v3 service strategy
Itil v3 service strategy
 

Ähnlich wie Web services security_in_wse_3_ppt

Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Accessbluntm64
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsIRJET Journal
 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect Nilanjan Roy
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on systemSwati Sinha
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For EducationSanjeev Raman
 
Understanding Claim based Authentication
Understanding Claim based AuthenticationUnderstanding Claim based Authentication
Understanding Claim based AuthenticationMohammad Yousri
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSAWS User Group Kochi
 

Ähnlich wie Web services security_in_wse_3_ppt (20)

Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed Systems
 
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
TMCnet final
TMCnet finalTMCnet final
TMCnet final
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on system
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Understanding Claim based Authentication
Understanding Claim based AuthenticationUnderstanding Claim based Authentication
Understanding Claim based Authentication
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Mb2420032007
Mb2420032007Mb2420032007
Mb2420032007
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
 

Mehr von Harshavardhan Achrekar

Mehr von Harshavardhan Achrekar (6)

Massivegraph telecom ppt
Massivegraph telecom pptMassivegraph telecom ppt
Massivegraph telecom ppt
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Relational data as_xml
Relational data as_xmlRelational data as_xml
Relational data as_xml
 
Query optimization for_sensor_networks
Query optimization for_sensor_networksQuery optimization for_sensor_networks
Query optimization for_sensor_networks
 
Measuring the happiness of large scale written expression harsh
Measuring the happiness of large scale written expression harshMeasuring the happiness of large scale written expression harsh
Measuring the happiness of large scale written expression harsh
 
A framework of distributed indexing and data
A framework of distributed indexing and dataA framework of distributed indexing and data
A framework of distributed indexing and data
 

Kürzlich hochgeladen

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Kürzlich hochgeladen (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Web services security_in_wse_3_ppt