Computer Networks (View More...)
Security | lec38 | 18.34 to 19.43 | VIDEO | |
Security | lec38 | 25.14 to 27.43 | VIDEO | |
Security | lec38 | 27.43 to 29.18 | VIDEO |
Cryptography and Network Security (View More...)
Symmetric Key Ciphers | lec10 | 01:39 to 05:21 | VIDEO | |
Symmetric Key Ciphers | lec10 | 13:22 to 15:16 | VIDEO | |
Symmetric Key Ciphers | lec10 | 15:16 to 18:51 | VIDEO |
Data Communication (View More...)
Wireless LANs | lec31 | 9:44 to 11:45 | VIDEO | |
Secured Communication - I | lec40 | 12:15 to 15:36 | VIDEO | |
Secured Communication - I | lec40 | 48:05 to 52:18 | VIDEO |
Database Design (View More...)
Introduction to Database Management System | lec1 | 00:34 to 00:36 | VIDEO | |
Storage Structures | lec11 | 00:51 to upto | VIDEO | |
Indexing Techniques Single level | lec12 | 33:53 to 36:02 | VIDEO |
Internet Technology (View More...)
Basic Cryptographic Concepts Part 1 | lec33 | 15:50 to 17:17 | VIDEO | |
Basic cryptographic concepts Part 2 | lec34 | 05:15 to 06:43 | VIDEO | |
Basic cryptographic concepts Part 2 | lec34 | 07:26 to 09:15 | VIDEO |
Introduction to Computer Graphics (View More...)
Computer Animation | lec33 | 05:34 to 08:10 | VIDEO | |
Computer Animation | lec33 | 10:43 to 13:58 | VIDEO | |
Computer Animation | lec33 | 13:58 to 15:30 | VIDEO |
Software Engineering (View More...)
Introduction to Software Engineering Challenges, Process Models etc. | lec1 | 03:57 to 04:57 | VIDEO | |
Introduction to Software Engineering Challenges, Process Models etc. | lec1 | 23:30 to 25:16 | VIDEO | |
Introduction to Software Engineering Challenges, Process Models etc. | lec1 | 25:16 to 27:27 | VIDEO |
No Records Found