Designing and coding of job search mechanism, Computer Network Security

Designing and coding of Job search mechanism:

Project Title: FREEHIVE (Sep 2005- Nov 2006)

Role             : Developer

Domain         : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : JAVA, J2EE, Struts, Hibernate, JavaScript, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is developed for creating and improving the career networking among his friends, colleagues, and relations.· Site provides to improve the communication in all the wide range between the friends, and site is used to convey his/her thinking and the way of his work, and user can also do the job postings for the current requirement and the improvement of the carrier. Also site provided to maintain their relation and can also put their effects in the word.

Responsibilities:    

  • Involved in designing and coding of Job search mechanism.
  • Involved in designing and coding of Job search result pagination.
  • Involved in designing and coding of Registration module.
  • Involved in designing and coding of getting the contacts from CSV file.
  • Implemented the TinyMCE editor in comment section.

 

Posted Date: 12/24/2012 5:21:50 AM | Location : United States







Related Discussions:- Designing and coding of job search mechanism, Assignment Help, Ask Question on Designing and coding of job search mechanism, Get Answer, Expert's Help, Designing and coding of job search mechanism Discussions

Write discussion on Designing and coding of job search mechanism
Your posts are moderated
Related Questions
QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do