Computer Architecture  (View More...)

Processor Design Exception Handling lec23 16:45 to 26:10 PDF VIDEO
Processor Design Exception Handling lec23 26:10 to 29:35 PDF VIDEO
Processor Design Exception Handling lec23 31:50 to 36:02 PDF VIDEO

Computer Organization  (View More...)

Virtual Memory lec19 26:06 to 39:16 PDF VIDEO
Virtual Memory (Contd…) lec20 20:23 to 32:12 PDF VIDEO
Virtual Memory (Contd…) lec20 32:12 to 51:52 PDF VIDEO

Cryptography and Network Security  (View More...)

Overview on Modern Cryptography lec2 28:15 to 30:37 PDF VIDEO
A Tutorial on Network Protocols lec38 06:29 to 09:05 PDF VIDEO
System Security lec39 28.00 to 33:58 PDF VIDEO

Database Design  (View More...)

Constraints and Triggers lec14 50:09 to 52:01 PDF VIDEO
Constraints and Triggers lec14 53:09 to 53:26 PDF VIDEO
Constraints and Triggers lec14 53:26 to 53:42 PDF VIDEO

High Performance Computer Architecture  (View More...)

Virtual Memory lec30 17:55 to 22:22 PDF VIDEO
Virtual Machines lec31 14:55 to 19:30 PDF VIDEO
Virtual Machines lec31 24:14 to 29:10 PDF VIDEO

High Performance Computing  (View More...)

Module No. # 03 lec12 01:32 to 04:07 PDF VIDEO
Module No. # 03 lec12 05:10 to 11:47 PDF VIDEO
Module No. # 03 lec12 11:47 to 16:40 PDF VIDEO

Internet Technology  (View More...)

Internet Extranet and Firewall lec32 01:59 to 04:44 PDF VIDEO
Internet Extranet and Firewall lec32 05:29 to 07:12 PDF VIDEO
Internet Extranet and Firewall lec32 07:12 to 09:30 PDF VIDEO
No Records Found
Any Queries, please contact us @ 09677117110 or mail to NPTEL.Bodhbridge@btechguru.com
Distributed under Creative Commons Attribution-Share Alike - CC BY-SA.
Back to top
View Cart & Pay (0)