Cryptography and Network Security  (View More...)

Introduction lec1 58:29 to upto PDF VIDEO
Few other Cryptanalytic Techniques lec16 01:45 to 02:15 PDF VIDEO
Few other Cryptanalytic Techniques lec16 57:11 to upto PDF VIDEO

Data Communication  (View More...)

Interfacing to the Media lec15 39:03 to 40:34 PDF VIDEO
Medium Access Control - I lec26 02:12 to 03:00 PDF VIDEO
Medium Access Control - I lec26 03:00 to 05:33 PDF VIDEO

Design and Analysis of Algorithms  (View More...)

Overview of the course lec1 04:51 to 06:49 PDF VIDEO
Overview of the course lec1 09:06 to 16:51 PDF VIDEO
lec17 lec17 15:00 to 25:08 PDF VIDEO

Software Engineering  (View More...)

Verification and Validation, Inspection, Clean room development lec22 33:33 to 36:18 PDF VIDEO
Overview of Phases (Part 1) lec3 07:33 to 10:58 PDF VIDEO
Overview of Phases (Part 1) lec3 10:58 to 12:53 PDF VIDEO
No Records Found
Any Queries, please contact us @ 09677117110 or mail to NPTEL.Bodhbridge@btechguru.com
Distributed under Creative Commons Attribution-Share Alike - CC BY-SA.
Back to top
View Cart & Pay (0)