Computer Networks (View More...)
Data Link Protocols | lec15 | 03:34 to 08:08 | VIDEO | |
Data Link Protocols | lec15 | 52:59 to 53:51 | VIDEO | |
Satellite Communication | lec18 | 13:35 to 156:3 | VIDEO |
Computer Organization (View More...)
Data path Architecture | lec6 | 00:10 to 00:16 | VIDEO | |
Data path Architecture | lec6 | 00:19 to 00:23 | VIDEO | |
Data path Architecture | lec6 | 00:23 to 00:27 | VIDEO |
Cryptography and Network Security (View More...)
Symmetric Key Ciphers | lec10 | 01:39 to 05:21 | VIDEO | |
Modes of Operation of Block Ciphers | lec18 | 18:01 to 20:33 | VIDEO | |
Modes of Operation of Block Ciphers | lec18 | 21:36 to 25:52 | VIDEO |
Data Communication (View More...)
Secured Communication - I | lec40 | 15:36 to 19:10 | VIDEO | |
Secured Communication - I | lec40 | 24:10 to 26:05 | VIDEO | |
Secured Communication - I | lec40 | 30:12 to 33:10 | VIDEO |
Internet Technology (View More...)
Basic Cryptographic Concepts Part 1 | lec33 | 17:17 to 19:27 | VIDEO | |
Basic Cryptographic Concepts Part 1 | lec33 | 19:27 to 21:25 | VIDEO | |
Basic Cryptographic Concepts Part 1 | lec33 | 38:39 to 40:02 | VIDEO |
System Analysis and Design (View More...)
lec25 | lec25 | 36:11 to 36:48 | VIDEO | |
lec25 | lec25 | 36:48 to 40:18 | VIDEO | |
lec31 | lec31 | 50:36 to 54:54 | VIDEO |
Theory of Automata, Formal Languages and Computation (View More...)
Turing Machine as a Generating Device | lec30 | 59:16 to upto | VIDEO | |
Ambiguity IN CFG | lec4 | 49:24 to upto | VIDEO | |
DNA Computing | lec41 | 00:23 to 05:06 | VIDEO |
No Records Found