Case Study | M. Narmatha | SNS Institutions
Narmatha.M SNS
Case Study | M. Narmatha | SNS Institutions
5:07
DT Video | M. Narmatha | SNS Institutions
Narmatha.M SNS
DT Video | M. Narmatha | SNS Institutions
5:34
Inter Process Communication IPC | M. Narmatha | SNS Institutions
Narmatha.M SNS
Inter Process Communication IPC | M. Narmatha | SNS Institutions
6:35
Process Scheduling | M. Narmatha | SNS Institutions
Narmatha.M SNS
Process Scheduling | M. Narmatha | SNS Institutions
5:56
Semaphores | M.Narmatha | SNS Institutions
Narmatha.M SNS
Semaphores | M.Narmatha | SNS Institutions
6:24
DT Video | M. Narmatha | SNS Institutions
Narmatha.M SNS
DT Video | M. Narmatha | SNS Institutions
5:58
Case Study | M.Narmatha | SNS Institutions
Narmatha.M SNS
Case Study | M.Narmatha | SNS Institutions
5:32
The AI Revolution in Stock Valuation | Case Study | SNS Institutions
Narmatha.M SNS
The AI Revolution in Stock Valuation | Case Study | SNS Institutions
6:54
Group Discussion | M.Narmatha | SNS Institutions
Narmatha.M SNS
Group Discussion | M.Narmatha | SNS Institutions
5:15
Methods | Java | SNS Institutions
Narmatha.M SNS
Methods | Java | SNS Institutions
6:40
Operators and Expression | Java | SNS Institutions
Narmatha.M SNS
Operators and Expression | Java | SNS Institutions
6:18
Classes and Object | Java | SNS Institutions
Narmatha.M SNS
Classes and Object | Java | SNS Institutions
8:19
DT Video   Group Discussion | M. Narmatha | SNS Institutions
Narmatha.M SNS
DT Video Group Discussion | M. Narmatha | SNS Institutions
5:01
Case Study | M.NARMATHA | SNS Institutions
Narmatha.M SNS
Case Study | M.NARMATHA | SNS Institutions
6:58
Penetration Testing | M. Narmatha | SNS Institutions
Narmatha.M SNS
Penetration Testing | M. Narmatha | SNS Institutions
5:11
Types of Testing | M. Narmatha | SNS Institutions
Narmatha.M SNS
Types of Testing | M. Narmatha | SNS Institutions
5:15
Business of Penetration Testing | M. Narmatha | SNS Institutions
Narmatha.M SNS
Business of Penetration Testing | M. Narmatha | SNS Institutions
5:07
Introduction to Servlets | M. Narmatha | SNS Institutions
Narmatha.M SNS
Introduction to Servlets | M. Narmatha | SNS Institutions
5:05
Sessions | M. Narmatha | SNS Institutions
Narmatha.M SNS
Sessions | M. Narmatha | SNS Institutions
6:19
Cookies in Web page | M. Narmatha | SNS Institutions
Narmatha.M SNS
Cookies in Web page | M. Narmatha | SNS Institutions
7:33
Case Study Digital Watermarking | M. Narmatha | SNS Institutions
Narmatha.M SNS
Case Study Digital Watermarking | M. Narmatha | SNS Institutions
5:51
DT  - Role Play Video | M. Narmatha | SNS Institutions
Narmatha.M SNS
DT - Role Play Video | M. Narmatha | SNS Institutions
5:03
DT Activity - Role Play  | M. Narmatha | SNS Institutions
Narmatha.M SNS
DT Activity - Role Play | M. Narmatha | SNS Institutions
6:04
Case Study – Two way Computation | M. Narmatha | SNS Institutions
Narmatha.M SNS
Case Study – Two way Computation | M. Narmatha | SNS Institutions
6:40
Javascript Syntax  | M. Narmatha | SNS Institutions
Narmatha.M SNS
Javascript Syntax | M. Narmatha | SNS Institutions
6:05
Javascript  | M. Narmatha | SNS Institutions
Narmatha.M SNS
Javascript | M. Narmatha | SNS Institutions
7:44
Javascript Function  | M. Narmatha | SNS Institutions
Narmatha.M SNS
Javascript Function | M. Narmatha | SNS Institutions
6:31
Case study| M.Narmatha | SNS Institutions
Narmatha.M SNS
Case study| M.Narmatha | SNS Institutions
5:53
DT Video | M.Narmatha | SNS Institutions
Narmatha.M SNS
DT Video | M.Narmatha | SNS Institutions
6:51
Application Authentication | M.Narmatha | SNS Institutions
Narmatha.M SNS
Application Authentication | M.Narmatha | SNS Institutions
6:43
Application Architectures | M.Narmatha | SNS Institutions
Narmatha.M SNS
Application Architectures | M.Narmatha | SNS Institutions
7:08
Application Performance and Security | M.Narmatha | SNS Institutions
Narmatha.M SNS
Application Performance and Security | M.Narmatha | SNS Institutions
5:51
Application Programs and User Interfaces | M.Narmatha | SNS Institutions
Narmatha.M SNS
Application Programs and User Interfaces | M.Narmatha | SNS Institutions
5:47
Encryption | M.Narmatha | SNS Institutions
Narmatha.M SNS
Encryption | M.Narmatha | SNS Institutions
5:58
HTML and HTTP | M.Narmatha | SNS Institutions
Narmatha.M SNS
HTML and HTTP | M.Narmatha | SNS Institutions
5:48
Scripting | M.Narmatha | SNS Institutions
Narmatha.M SNS
Scripting | M.Narmatha | SNS Institutions
5:52
Servlets | M.Narmatha | SNS Institutions
Narmatha.M SNS
Servlets | M.Narmatha | SNS Institutions
5:52
Process,Strorage and Memory management
Narmatha.M SNS
Process,Strorage and Memory management
7:09
System Calls and its types
Narmatha.M SNS
System Calls and its types
7:01
Types of OS
Narmatha.M SNS
Types of OS
5:18
What is Operating System
Narmatha.M SNS
What is Operating System
5:52
Key Exchange Protocols
Narmatha.M SNS
Key Exchange Protocols
5:36
Diffie Hellman Key Exchange
Narmatha.M SNS
Diffie Hellman Key Exchange
5:21
DT video
Narmatha.M SNS
DT video
5:43
Case Study
Narmatha.M SNS
Case Study
3:20
Exponentiation
Narmatha.M SNS
Exponentiation
5:44
Public Key Cryptography
Narmatha.M SNS
Public Key Cryptography
5:24
Public Key Requirement
Narmatha.M SNS
Public Key Requirement
5:12
RSA
Narmatha.M SNS
RSA
4:36
Elliptic Curve Cryptography
Narmatha.M SNS
Elliptic Curve Cryptography
5:57
ElGamal Cryptography
Narmatha.M SNS
ElGamal Cryptography
5:17
Hash function cryptanalysis
Narmatha.M SNS
Hash function cryptanalysis
5:09
Hash Function Requirement
Narmatha.M SNS
Hash Function Requirement
5:33
Case Study   Information Security
Narmatha.M SNS
Case Study Information Security
6:04
Hash Function
Narmatha.M SNS
Hash Function
6:16
Hash function Attack
Narmatha.M SNS
Hash function Attack
5:19
AES 1
Narmatha.M SNS
AES 1
5:01
AES Arithmetic
Narmatha.M SNS
AES Arithmetic
5:37
AES Decryption
Narmatha.M SNS
AES Decryption
5:13
INTRODUCTION TO AES
Narmatha.M SNS
INTRODUCTION TO AES
5:25
Data Encryption Standard   2
Narmatha.M SNS
Data Encryption Standard 2
7:06
Data Encryption Standard
Narmatha.M SNS
Data Encryption Standard
7:25
DES Decryption
Narmatha.M SNS
DES Decryption
7:04
Differential Cryptanalysis
Narmatha.M SNS
Differential Cryptanalysis
7:18
Block Cipher and Feistel Cipher
Narmatha.M SNS
Block Cipher and Feistel Cipher
7:05
Output Feedback and Counters
Narmatha.M SNS
Output Feedback and Counters
7:15
Multiple Encryption with DES
Narmatha.M SNS
Multiple Encryption with DES
5:52
Modes of Operation 2
Narmatha.M SNS
Modes of Operation 2
5:46
Modes of Operations
Narmatha.M SNS
Modes of Operations
6:34
Block Cipher
Narmatha.M SNS
Block Cipher
5:57
Case Study   Cryptography
Narmatha.M SNS
Case Study Cryptography
6:27
Public Key Cryptography
Narmatha.M SNS
Public Key Cryptography
5:33
Psuedo Random Generator   1
Narmatha.M SNS
Psuedo Random Generator 1
5:19
Psuedo Random Generator   2
Narmatha.M SNS
Psuedo Random Generator 2
5:16
One Time Pad
Narmatha.M SNS
One Time Pad
5:23
Introduction to Cryptography
Narmatha.M SNS
Introduction to Cryptography
4:24
Message Authentication code&Stegnography
Narmatha.M SNS
Message Authentication code&Stegnography
6:19
Digital Signatures
Narmatha.M SNS
Digital Signatures
5:58
Attacks on One Time Pad
Narmatha.M SNS
Attacks on One Time Pad
4:50
Big Data Analytics Introduction
Narmatha.M SNS
Big Data Analytics Introduction
5:07
Big Data Application in Education and Healthcare
Narmatha.M SNS
Big Data Application in Education and Healthcare
5:59
Big Data Applications in Weather, Transport, Space and Business
Narmatha.M SNS
Big Data Applications in Weather, Transport, Space and Business
6:01
Big Data Stack
Narmatha.M SNS
Big Data Stack
6:29
Case Study on Big Data
Narmatha.M SNS
Case Study on Big Data
6:23
Challenges in Big Data Analytics
Narmatha.M SNS
Challenges in Big Data Analytics
4:43
Terminologies used in Big data Environment
Narmatha.M SNS
Terminologies used in Big data Environment
5:13
Why Big Data
Narmatha.M SNS
Why Big Data
6:44
How big data analytics works
Narmatha.M SNS
How big data analytics works
6:31
Deadlock Prevention
Narmatha.M SNS
Deadlock Prevention
5:34
Deadlock detection and recovery
Narmatha.M SNS
Deadlock detection and recovery
5:27
Deadlock Avoidance
Narmatha.M SNS
Deadlock Avoidance
5:14
Case study   Windows 7
Narmatha.M SNS
Case study Windows 7
6:07
Deadlock
Narmatha.M SNS
Deadlock
5:19
process states
Narmatha.M SNS
process states
5:00
PROCESS STATE VS PROCESS STATE TRANSITION
Narmatha.M SNS
PROCESS STATE VS PROCESS STATE TRANSITION
6:32
PROCESS CONTROL BLOCK
Narmatha.M SNS
PROCESS CONTROL BLOCK
5:28
operations on a process
Narmatha.M SNS
operations on a process
4:55
PROCESS
Narmatha.M SNS
PROCESS
5:34