Computer Networks (View More...)
Emergence of Networks and Reference Models | lec1 | 28:51 to 31:16 | VIDEO | |
Emergence of Networks and Reference Models | lec1 | 37:58 to 39:37 | VIDEO | |
Emergence of Networks and Reference Models | lec1 | 44:11 to 44:34 | VIDEO |
Cryptography and Network Security (View More...)
A Tutorial on Network Protocols | lec38 | 02:07 to 04:05 | VIDEO | |
A Tutorial on Network Protocols | lec38 | 21:10 to 24:53 | VIDEO | |
A Tutorial on Network Protocols | lec38 | 29:04 to 31:08 | VIDEO |
Data Communication (View More...)
Layered Architecture | lec2 | 47:10 to 48:30 | VIDEO | |
Layered Architecture | lec2 | 54:50 to 00:57 | VIDEO | |
Layered Architecture | lec2 | 59:15 to 59:30 | VIDEO |
Database Design (View More...)
Indexing Techniques Multi-Level and Dynamic Indexes | lec13 | 54:42 to upto | VIDEO | |
Query Processing and Optimization | lec15 | 05:07 to 12:08 | VIDEO | |
Query Processing and Optimization | lec15 | 13:33 to 15:49 | VIDEO |
Internet Technology (View More...)
Basic cryptographic concepts - Part 3 | lec35 | 21:29 to 23:40 | VIDEO | |
Electronic commerce | lec36 | 57:35 to 57:56 | VIDEO | |
Electronic commerce | lec36 | 58:22 to 58:56 | VIDEO |
Software Engineering (View More...)
Software Design - Primary Consideration | lec14 | 04:00 to 07:57 | VIDEO | |
Reuse Continued Frameworks, Product Families, COTS, Design Patterns Design Reuse | lec28 | 28:41 to 37:02 | VIDEO | |
Project Scope Management | lec30 | 42:43 to 01:07 | VIDEO |
No Records Found