Computer Networks (View More...)
ATM: Asynchronous Transfer Mode | lec24 | 33:10 to 34:05 | VIDEO | |
IP Version 4 | lec28 | 46:15 to 50:57 | VIDEO | |
Security | lec38 | 25.14 to 27.43 | VIDEO |
Cryptography and Network Security (View More...)
Cryptographic Hash Functions | lec23 | 05:57 to 07:08 | VIDEO | |
The RSA Cryptosystem | lec28 | 03:16 to 04:30 | VIDEO | |
The RSA Cryptosystem | lec28 | 04:30 to 07:43 | VIDEO |
Data Communication (View More...)
Secured Communication - I | lec40 | 52:18 to 53:30 | VIDEO | |
Secured Communication - II | lec41 | 01:38 to 02:49 | VIDEO | |
Secured Communication - II | lec41 | 07:37 to 09:28 | VIDEO |
High Performance Computer Architecture (View More...)
Introduction and Course Outline | lec1 | 42:34 to 43:35 | VIDEO | |
Introduction and Course Outline | lec1 | 44:00 to 45:36 | VIDEO | |
Introduction and Course Outline | lec1 | 53:28 to 54:25 | VIDEO |
Internet Technology (View More...)
World Wide Web Part II | lec12 | 24:30 to 27:33 | VIDEO | |
World Wide Web Part II | lec12 | 28:10 to 32:11 | VIDEO | |
World Wide Web Part II | lec12 | 35:48 to 40:06 | VIDEO |
Software Engineering (View More...)
Producing Quality Software- Introduction to Software quality, Abstraction, Reuse, Modularity etc. | lec13 | 45:55 to 47:14 | VIDEO | |
Software Design - Primary Consideration | lec14 | 58:35 to 59:30 | VIDEO | |
Design Patterns | lec15 | 26:43 to 29:24 | VIDEO |
No Records Found