Professional Documents
Culture Documents
BE Project Synopsis
(Note: All information should be given in printed format.)
BE Project Title:
Hardware Requirements:
Laptop i5 processor
8GB RAM
3
Recommendation from at least three faculty members with suggestions if any whom
you discussed your project title.
Suggestions:
1.
2.
3.
4.
Recommended: – Yes / No
Faculty 1__________________________________________
Faculty 2__________________________________________
Faculty 3__________________________________________
References:
[1] "Transparent Proxy Definition". ukproxyserver.org. 1 February 2011. Archived from the original
on 1 March 2013. Retrieved 14 February 2013.
[2] "Proxy servers and tunneling". MDN Web Docs. Archived from the original on 26 November
2020. Retrieved 6 December 2020.
[3] D. Gourley and B. Totty, "Http: The Definitive Guide," O'Reilly Media, 2002, pp. 131-137.
[4] M. Ligh, S. Adair, B. Hartstein and M. Richard, "Malware Analyst's
Cookbook and DVD : Tools and Techniques for Fighting Malicious Code," John Wiley & Sons, 2010,
pp. 11-15.
[5] V. Rawat, R. Tio, S. Nanji and R. Verma, "Layer Two Tunneling Protocol (L2TP) over Frame
Relay," February 2001, pp. 1-3. [Online]. Available:
[6] Applications Now Available for City Colleges of Chicago’s New Cyber Security “Boot Camp”.
(2017, March 18). Retrieved from http://www.ccc.edu/news/Pages/Applications-Now-Available-for-
City-Colleges-of-Chicagos-New-Cyber-Security-Boot-Camp-.aspx