Narmatha.M SNS
Case Study | M. Narmatha | SNS Institutions
5:07
Narmatha.M SNS
DT Video | M. Narmatha | SNS Institutions
5:34
Narmatha.M SNS
Inter Process Communication IPC | M. Narmatha | SNS Institutions
6:35
Narmatha.M SNS
Process Scheduling | M. Narmatha | SNS Institutions
5:56
Narmatha.M SNS
Semaphores | M.Narmatha | SNS Institutions
6:24
Narmatha.M SNS
DT Video | M. Narmatha | SNS Institutions
5:58
Narmatha.M SNS
Case Study | M.Narmatha | SNS Institutions
5:32
Narmatha.M SNS
The AI Revolution in Stock Valuation | Case Study | SNS Institutions
6:54
Narmatha.M SNS
Group Discussion | M.Narmatha | SNS Institutions
5:15
Narmatha.M SNS
Methods | Java | SNS Institutions
6:40
Narmatha.M SNS
Operators and Expression | Java | SNS Institutions
6:18
Narmatha.M SNS
Classes and Object | Java | SNS Institutions
8:19
Narmatha.M SNS
DT Video Group Discussion | M. Narmatha | SNS Institutions
5:01
Narmatha.M SNS
Case Study | M.NARMATHA | SNS Institutions
6:58
Narmatha.M SNS
Penetration Testing | M. Narmatha | SNS Institutions
5:11
Narmatha.M SNS
Types of Testing | M. Narmatha | SNS Institutions
5:15
Narmatha.M SNS
Business of Penetration Testing | M. Narmatha | SNS Institutions
5:07
Narmatha.M SNS
Introduction to Servlets | M. Narmatha | SNS Institutions
5:05
Narmatha.M SNS
Sessions | M. Narmatha | SNS Institutions
6:19
Narmatha.M SNS
Cookies in Web page | M. Narmatha | SNS Institutions
7:33
Narmatha.M SNS
Case Study Digital Watermarking | M. Narmatha | SNS Institutions
5:51
Narmatha.M SNS
DT - Role Play Video | M. Narmatha | SNS Institutions
5:03
Narmatha.M SNS
DT Activity - Role Play | M. Narmatha | SNS Institutions
6:04
Narmatha.M SNS
Case Study – Two way Computation | M. Narmatha | SNS Institutions
6:40
Narmatha.M SNS
Javascript Syntax | M. Narmatha | SNS Institutions
6:05
Narmatha.M SNS
Javascript | M. Narmatha | SNS Institutions
7:44
Narmatha.M SNS
Javascript Function | M. Narmatha | SNS Institutions
6:31
Narmatha.M SNS
Case study| M.Narmatha | SNS Institutions
5:53
Narmatha.M SNS
DT Video | M.Narmatha | SNS Institutions
6:51
Narmatha.M SNS
Application Authentication | M.Narmatha | SNS Institutions
6:43
Narmatha.M SNS
Application Architectures | M.Narmatha | SNS Institutions
7:08
Narmatha.M SNS
Application Performance and Security | M.Narmatha | SNS Institutions
5:51
Narmatha.M SNS
Application Programs and User Interfaces | M.Narmatha | SNS Institutions
5:47
Narmatha.M SNS
Encryption | M.Narmatha | SNS Institutions
5:58
Narmatha.M SNS
HTML and HTTP | M.Narmatha | SNS Institutions
5:48
Narmatha.M SNS
Scripting | M.Narmatha | SNS Institutions
5:52
Narmatha.M SNS
Servlets | M.Narmatha | SNS Institutions
5:52
Narmatha.M SNS
Process,Strorage and Memory management
7:09
Narmatha.M SNS
System Calls and its types
7:01
Narmatha.M SNS
Types of OS
5:18
Narmatha.M SNS
What is Operating System
5:52
Narmatha.M SNS
Key Exchange Protocols
5:36
Narmatha.M SNS
Diffie Hellman Key Exchange
5:21
Narmatha.M SNS
DT video
5:43
Narmatha.M SNS
Case Study
3:20
Narmatha.M SNS
Exponentiation
5:44
Narmatha.M SNS
Public Key Cryptography
5:24
Narmatha.M SNS
Public Key Requirement
5:12
Narmatha.M SNS
RSA
4:36
Narmatha.M SNS
Elliptic Curve Cryptography
5:57
Narmatha.M SNS
ElGamal Cryptography
5:17
Narmatha.M SNS
Hash function cryptanalysis
5:09
Narmatha.M SNS
Hash Function Requirement
5:33
Narmatha.M SNS
Case Study Information Security
6:04
Narmatha.M SNS
Hash Function
6:16
Narmatha.M SNS
Hash function Attack
5:19
Narmatha.M SNS
AES 1
5:01
Narmatha.M SNS
AES Arithmetic
5:37
Narmatha.M SNS
AES Decryption
5:13
Narmatha.M SNS
INTRODUCTION TO AES
5:25
Narmatha.M SNS
Data Encryption Standard 2
7:06
Narmatha.M SNS
Data Encryption Standard
7:25
Narmatha.M SNS
DES Decryption
7:04
Narmatha.M SNS
Differential Cryptanalysis
7:18
Narmatha.M SNS
Block Cipher and Feistel Cipher
7:05
Narmatha.M SNS
Output Feedback and Counters
7:15
Narmatha.M SNS
Multiple Encryption with DES
5:52
Narmatha.M SNS
Modes of Operation 2
5:46
Narmatha.M SNS
Modes of Operations
6:34
Narmatha.M SNS
Block Cipher
5:57
Narmatha.M SNS
Case Study Cryptography
6:27
Narmatha.M SNS
Public Key Cryptography
5:33
Narmatha.M SNS
Psuedo Random Generator 1
5:19
Narmatha.M SNS
Psuedo Random Generator 2
5:16
Narmatha.M SNS
One Time Pad
5:23
Narmatha.M SNS
Introduction to Cryptography
4:24
Narmatha.M SNS
Message Authentication code&Stegnography
6:19
Narmatha.M SNS
Digital Signatures
5:58
Narmatha.M SNS
Attacks on One Time Pad
4:50
Narmatha.M SNS
Big Data Analytics Introduction
5:07
Narmatha.M SNS
Big Data Application in Education and Healthcare
5:59
Narmatha.M SNS
Big Data Applications in Weather, Transport, Space and Business
6:01
Narmatha.M SNS
Big Data Stack
6:29
Narmatha.M SNS
Case Study on Big Data
6:23
Narmatha.M SNS
Challenges in Big Data Analytics
4:43
Narmatha.M SNS
Terminologies used in Big data Environment
5:13
Narmatha.M SNS
Why Big Data
6:44
Narmatha.M SNS
How big data analytics works
6:31
Narmatha.M SNS
Deadlock Prevention
5:34
Narmatha.M SNS
Deadlock detection and recovery
5:27
Narmatha.M SNS
Deadlock Avoidance
5:14
Narmatha.M SNS
Case study Windows 7
6:07
Narmatha.M SNS
Deadlock
5:19
Narmatha.M SNS
process states
5:00
Narmatha.M SNS
PROCESS STATE VS PROCESS STATE TRANSITION
6:32
Narmatha.M SNS
PROCESS CONTROL BLOCK
5:28
Narmatha.M SNS
operations on a process
4:55
Narmatha.M SNS
PROCESS
5:34