SlideShare a Scribd company logo
1 of 28
o

o

o

o

o

o

Nosstateful
Stateful

DMZ
Proxy
download

1

Firewall
5

DEC
8

AT&T Bell Laboratories

.
. SEAL

"SEAL"

Cisco

2

Packet Filtering Firewalls
Cisco
4
Jeff Mogul
5
Digital Equipment Corporation
6
Dave Presetto
7
Howard Trickey
3

8
9

circuit level firewalls
Bill Cheswick
11
Marcus Ranum
12
Gene Spafford
13
Application Layer Firewalls
14
Proxy-Based Firewalls
15
Bob Braden
16
Annette DeSchlon
17
Visas
18
Visual Integration
19
Check Point Software
20
Scott Wiegel
21
Global Internet Software Group
22
Kernel Proxy architecture
10

DEC
"

"

.

.

23

fireWall
URL
-

DsL

patch
24

Packet Filtering
mini Computer

DVD

CD
E-mail

Trojan

E-mail Worms
Worm

25

E-mail Worms
Simple Mail Transfer Protocol

26

26

SMTP
Dial up
upgrade

upgrade

un-install

memory CPU
dialup

TCP

TCP

TCP

27

No Interface
Circuit-LeveL

28
Nosstateful packet

IP
Stateful Packet

UDP TCP
TCP
FTP

Stateful

TCP

TCP
HTTP

PC
DMZ

DMZ
:
IP

IP

IP
IP

: , ,,.
64 16
236 52

IP

IP
.
IP
IP
69,254,15,25

www
. .
goole
com

.

browser

http
:

29

domain names

30

client
31
server
32

IP

TCP

.
34

HTTP

UDP
FTP
ICMP
.
SMTP

SNMP

FTP
.

"
x-rated
"
"
x-rated " rated
" x
"

32

Internet Protocol
Transmission Control Protocol
34
Hyper Text Transfer Protocol
35
User Datagram Protocol
36
File Transfer Protocol
37
Internet Control Message Protocol
38
Simple mail transport protocol
39
Simple Network Management protocol
33

( )
FTP

(
HTTP
)
LAN
resource

.
.
IP TCP
:
40

40

Accept Mode
Blocking Mode

41
42

.

.
TCP/IP

header

:

FTP Telnet
Telnet
header

header

IP
:

IP
.
IP
IP

.

42

Response Mode
Identifier & Fragment Offset

43
.
.

44

IP
.

IP
.

:

header
:

ftp
TCP
ftp
Telnet
.
.

:
46

:

TCP

44

Pocket Filtering Router
Acknowledgment
46
TCP code Bits
45

SYN=1
TCP

"

"
TCP
.
.

:

.

.

header

TCP
:

.

(backdoor)
.
e-mail
e-mail
SMTP

e-mail

e-mail

.
backdoor

.

.
.

.
e - mail
.

47

e -mail
e-mail

Remote Login
Application Backdoor
49
SMTP session hijacking
50
spam
51
Operating system bugs
52
Denial of service
48

e-mail

E- mail
.

.

.

.

backdoor

cookie

ICMP

.

e-mail

.
.

53

Macros
Spam
55
Redirect bombs
56
Source routing
54

e-mail
e-mail
.

.

DMZ Proxy
proxy

.

.

:

online
FTP
-

57

DMZ

DMZ

.
DMZ
DMZ

DMZ

57

Demilitarized Zone

gateway
NAT
ZonAlram pro
2008

ZoneAlarm

Shield Pro FireWall
2008

repair

Hauri
inbox

Prisma FireWall

TCP

Panda

.

. .
URL

.

proxy
proxy

http

.

free proxy
:

www.homenethelp.com/web/ howto/free-firewall.asp
http://www.all-internet-security.com/top_10_firewall_software.html
http://networking.anandsoft.com/ad vantages-of-hardware-firewalls.html
http://www.faqs.org/qa/qa-4838.html
http://www.smallbusinesscomputing.c om/webmaster/article.php/3103431
http://personal-firewall-software-review.t optenreviews.com/hardware-firewalls-vssoftware-firewalls.html
http://www.webopedia.com/didyouknow/hardwaresoftware/2004/firewall_types.asp
http://www.evaluateit.co.uk/small_business/firewalls.html
http://cms-london.com/ articletext.php?id=105
http://www.srco.ir/Articles/TipsView.asp?ID=254
http://www.alliancedatacom.com/firewall-tutorial.htm
http://www.npc-rt.ir/newsdetail-fa-20.html
http://fa.wikipedia.org/wiki
http://atalebi.com/articles/show.asp?ID=427
http://www.iran20.ir/view.asp?id=50005879719100001
http://forum.sohail2d.com/viewtopic.php?t=9183
http://www.iritn.com/?action=show&type=news&id=7216
http://www.microrayaneh.com/Articles/Internet/Firewall2.htm
http://www.indstate.edu/ect/ECT680/fall03_papers/Pramod.pdf

More Related Content

What's hot

Securing & Optimizing Linux the Hacking Solution (v.3.0)
Securing & Optimizing Linux the Hacking Solution (v.3.0)Securing & Optimizing Linux the Hacking Solution (v.3.0)
Securing & Optimizing Linux the Hacking Solution (v.3.0)- Mark - Fullbright
 
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...sonjeku1
 
Shadow pad technical_description_pdf
Shadow pad technical_description_pdfShadow pad technical_description_pdf
Shadow pad technical_description_pdfAndrey Apuhtin
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaHanaysha
 
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory SegalPassive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory SegalCODE BLUE
 
2008-11-13 CAVMEN RHEL for System z Deep Dive
2008-11-13 CAVMEN RHEL for System z Deep Dive2008-11-13 CAVMEN RHEL for System z Deep Dive
2008-11-13 CAVMEN RHEL for System z Deep DiveShawn Wells
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
Using system fingerprints to track attackers
Using system fingerprints to track attackersUsing system fingerprints to track attackers
Using system fingerprints to track attackersLance Cottrell
 
Hot potato Privilege Escalation
Hot potato Privilege EscalationHot potato Privilege Escalation
Hot potato Privilege EscalationSunny Neo
 

What's hot (15)

Securing & Optimizing Linux the Hacking Solution (v.3.0)
Securing & Optimizing Linux the Hacking Solution (v.3.0)Securing & Optimizing Linux the Hacking Solution (v.3.0)
Securing & Optimizing Linux the Hacking Solution (v.3.0)
 
Common Ports
Common PortsCommon Ports
Common Ports
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Metasploitable
MetasploitableMetasploitable
Metasploitable
 
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
 
Report (11)
Report (11)Report (11)
Report (11)
 
Shadow pad technical_description_pdf
Shadow pad technical_description_pdfShadow pad technical_description_pdf
Shadow pad technical_description_pdf
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory SegalPassive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
 
2008-11-13 CAVMEN RHEL for System z Deep Dive
2008-11-13 CAVMEN RHEL for System z Deep Dive2008-11-13 CAVMEN RHEL for System z Deep Dive
2008-11-13 CAVMEN RHEL for System z Deep Dive
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
IoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideasIoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideas
 
Using system fingerprints to track attackers
Using system fingerprints to track attackersUsing system fingerprints to track attackers
Using system fingerprints to track attackers
 
Undead Attack
Undead AttackUndead Attack
Undead Attack
 
Hot potato Privilege Escalation
Hot potato Privilege EscalationHot potato Privilege Escalation
Hot potato Privilege Escalation
 

Viewers also liked

امنیت شبکه های مخابراتی
امنیت شبکه های مخابراتیامنیت شبکه های مخابراتی
امنیت شبکه های مخابراتیarichoana
 
شبکه های ماهواره ای vsat
شبکه های ماهواره ای vsatشبکه های ماهواره ای vsat
شبکه های ماهواره ای vsatarichoana
 
تئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ایتئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ایDany Khosravi
 
Killi horiznes
Killi horiznesKilli horiznes
Killi horiznes13fladjj1
 
Using A Management Consultancy: What To Expect
Using A Management Consultancy: What To ExpectUsing A Management Consultancy: What To Expect
Using A Management Consultancy: What To ExpectStu Lunn
 
One Pager Case Study- The Clubhouse
One Pager Case Study- The ClubhouseOne Pager Case Study- The Clubhouse
One Pager Case Study- The ClubhouseDenver Hollingsworth
 
Perguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chiaPerguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chiaSemente de Chia
 
CISCO Packet Tracer
CISCO Packet TracerCISCO Packet Tracer
CISCO Packet Tracerarichoana
 
International 2nd scientific e conference
International 2nd scientific e conferenceInternational 2nd scientific e conference
International 2nd scientific e conferenceTexila E Conference
 

Viewers also liked (14)

Security
SecuritySecurity
Security
 
امنیت شبکه های مخابراتی
امنیت شبکه های مخابراتیامنیت شبکه های مخابراتی
امنیت شبکه های مخابراتی
 
شبکه های ماهواره ای vsat
شبکه های ماهواره ای vsatشبکه های ماهواره ای vsat
شبکه های ماهواره ای vsat
 
تئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ایتئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ای
 
Killi horiznes
Killi horiznesKilli horiznes
Killi horiznes
 
Using A Management Consultancy: What To Expect
Using A Management Consultancy: What To ExpectUsing A Management Consultancy: What To Expect
Using A Management Consultancy: What To Expect
 
One Pager Case Study- The Clubhouse
One Pager Case Study- The ClubhouseOne Pager Case Study- The Clubhouse
One Pager Case Study- The Clubhouse
 
Perguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chiaPerguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chia
 
CISCO Packet Tracer
CISCO Packet TracerCISCO Packet Tracer
CISCO Packet Tracer
 
Mss Lick09
Mss Lick09Mss Lick09
Mss Lick09
 
International 2nd scientific e conference
International 2nd scientific e conferenceInternational 2nd scientific e conference
International 2nd scientific e conference
 
Consulta general
Consulta generalConsulta general
Consulta general
 
Education
EducationEducation
Education
 
Utm
UtmUtm
Utm
 

Similar to Firewall

Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and securityMichael Earls
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Cisco Security
 
Geek Pic-Nic Master Class
Geek Pic-Nic Master ClassGeek Pic-Nic Master Class
Geek Pic-Nic Master ClassMediaTek Labs
 
FreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloFreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloValerio Balbi
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemDheryta Jaisinghani
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronUsing PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronVikram G Hosakote
 
network connet
network connetnetwork connet
network connetreyvanth
 
Intel DPDK Step by Step instructions
Intel DPDK Step by Step instructionsIntel DPDK Step by Step instructions
Intel DPDK Step by Step instructionsHisaki Ohara
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your networkBrandon DeVault
 
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!EC-Council
 
LAN Diagram Sample 2015
LAN Diagram Sample 2015LAN Diagram Sample 2015
LAN Diagram Sample 2015Glenn MacKie
 

Similar to Firewall (20)

GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
RAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LISTRAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LIST
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)
 
Puertos comunes
Puertos comunesPuertos comunes
Puertos comunes
 
Geek Pic-Nic Master Class
Geek Pic-Nic Master ClassGeek Pic-Nic Master Class
Geek Pic-Nic Master Class
 
Intro to firewalls
Intro to firewallsIntro to firewalls
Intro to firewalls
 
FreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloFreeLix: Semplicità & Controllo
FreeLix: Semplicità & Controllo
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
 
Common ports
Common portsCommon ports
Common ports
 
Common Ports .pdf
Common Ports .pdfCommon Ports .pdf
Common Ports .pdf
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronUsing PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
 
network connet
network connetnetwork connet
network connet
 
ATT&CK BINGO
ATT&CK BINGOATT&CK BINGO
ATT&CK BINGO
 
Intel DPDK Step by Step instructions
Intel DPDK Step by Step instructionsIntel DPDK Step by Step instructions
Intel DPDK Step by Step instructions
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your network
 
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
 
Multi cloud security with cisco cloud services (Taras Kolodchyn)
Multi cloud security with cisco cloud services (Taras Kolodchyn)Multi cloud security with cisco cloud services (Taras Kolodchyn)
Multi cloud security with cisco cloud services (Taras Kolodchyn)
 
LAN Diagram Sample 2015
LAN Diagram Sample 2015LAN Diagram Sample 2015
LAN Diagram Sample 2015
 

More from arichoana

Adsl Configuration Part b
Adsl Configuration Part bAdsl Configuration Part b
Adsl Configuration Part barichoana
 
Hassan semyari data center
Hassan semyari   data centerHassan semyari   data center
Hassan semyari data centerarichoana
 
Active directory
Active directoryActive directory
Active directoryarichoana
 
تفاوت ADSL با SHDSL
تفاوت ADSL با SHDSLتفاوت ADSL با SHDSL
تفاوت ADSL با SHDSLarichoana
 
وایمکس
وایمکسوایمکس
وایمکسarichoana
 
پروژه مسیریاب
پروژه مسیریابپروژه مسیریاب
پروژه مسیریابarichoana
 
پروژه مسيرياب
پروژه مسيريابپروژه مسيرياب
پروژه مسيريابarichoana
 
آشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSMآشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSMarichoana
 
اينترنت ماهواره
اينترنت ماهوارهاينترنت ماهواره
اينترنت ماهوارهarichoana
 
Cloud computing
Cloud computingCloud computing
Cloud computingarichoana
 
انواع خطوط مخابراتی
انواع خطوط مخابراتیانواع خطوط مخابراتی
انواع خطوط مخابراتیarichoana
 
امنیت شبکه
امنیت شبکهامنیت شبکه
امنیت شبکهarichoana
 
تفاوت پایه ای شبکه های وایرلس
تفاوت پایه ای شبکه های وایرلستفاوت پایه ای شبکه های وایرلس
تفاوت پایه ای شبکه های وایرلسarichoana
 

More from arichoana (20)

Adsl Configuration Part b
Adsl Configuration Part bAdsl Configuration Part b
Adsl Configuration Part b
 
Part a
Part aPart a
Part a
 
Part a
Part aPart a
Part a
 
Hassan semyari data center
Hassan semyari   data centerHassan semyari   data center
Hassan semyari data center
 
Active directory
Active directoryActive directory
Active directory
 
Voip
VoipVoip
Voip
 
تفاوت ADSL با SHDSL
تفاوت ADSL با SHDSLتفاوت ADSL با SHDSL
تفاوت ADSL با SHDSL
 
وایمکس
وایمکسوایمکس
وایمکس
 
پروژه مسیریاب
پروژه مسیریابپروژه مسیریاب
پروژه مسیریاب
 
پروژه مسيرياب
پروژه مسيريابپروژه مسيرياب
پروژه مسيرياب
 
آشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSMآشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSM
 
اينترنت ماهواره
اينترنت ماهوارهاينترنت ماهواره
اينترنت ماهواره
 
Ddos dos
Ddos dosDdos dos
Ddos dos
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
VPLS
VPLSVPLS
VPLS
 
انواع خطوط مخابراتی
انواع خطوط مخابراتیانواع خطوط مخابراتی
انواع خطوط مخابراتی
 
امنیت شبکه
امنیت شبکهامنیت شبکه
امنیت شبکه
 
تفاوت پایه ای شبکه های وایرلس
تفاوت پایه ای شبکه های وایرلستفاوت پایه ای شبکه های وایرلس
تفاوت پایه ای شبکه های وایرلس
 
Hr book 6.
Hr book 6.Hr book 6.
Hr book 6.
 
Hr book 5.
Hr book 5.Hr book 5.
Hr book 5.
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Firewall