Upload
rraki
View
215
Download
1
Embed Size (px)
DESCRIPTION
this is format of technical seminar
Citation preview
SECURITY THREATS/ATTACKS PRESENT IN
CLOUD ENVIRONMENT
A Technical Seminar Report
Submitted by
B.ASHWINI 117Y1A0567
Submitted in partial fulfillment for the award of the degree
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
MARRI LAXMAN REDDYInstitute of Technology & Management
(Approved by AICTE, New Delhi & Affiliated JNTU, Hyderabad) Dundigal, Quthbullapur (M), Hyderabad-500043.
APRIL 2015
MARRI LAXMAN REDDYInstitute of Technology & Management
(Approved by AICTE, New Delhi & Affiliated JNTU, Hyderabad) Dundigal, Quthbullapur (M), Hyderabad-500043.
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
CERTIFICATECertified that this is a bonafide record of the Seminar Entitled “SECURITY
THREATS/ATTACKS PRESENT IN CLOUD ENVIRONMENT” Done by B.ASHWINI
(117Y1A0567). Of the B.TECH IV year IV semester, COMPUTER SCIENCE AND
ENGINNERING in the Year 2014-2015 in partial fulfillment of the requirements to the
award of Degree Of Bachelor of Technology in COMPUTER SCIENCE &
ENGINEERING of JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY.
COORDINATOR HEAD OF DEPARTMENT
ACKNOWLEDGEMENT
` YOUR NAME
HTNO
ABSTRACT
CONTENTS
CHAPTER 1
INTRODUCTION
CHAPTER 2
2.1 ARCHITECTURE,
2.2 APPLICATIONS)
2.3 LIMITATIONS, ETC.
(NOTE: Depending on the technical seminar topic , the subtopics of this second chapter may increase. The subtopic names(that is 2.1,2.1,2.3, etc. may change depending on your technical seminar topic).The subtopics 2.1, 2.2, 2.3 are given as examples , you may have extra subtopics. This second chapter should cover all the technical details of your technical seminar.)
3.CONCLUSION
REFERENCES