Found 188 presentations matching your search
mitre attack examples
very good
Chained_hash_tables: examples with c ++ programming examples
Time & Space Complexity
This ppt is about the symbol table, data structures used in it and its implementation.
1
This is Data structure chapter one
gvdjshcA>:FI VBhvjvbfskjffweojjjjjjjjjjjjjj
Overview of Compiler Passes in Compiler Construction Compiler construction is a critical field in c...
Operating System-File anagement
This is for learning purpose. This will help engineering students to learn Operating System in detai...
file management
Delve into the dynamic concept of control flow in Python with a focus on while loops in this informa...
ftgvybhunjimk
Public Key Cryptography,Rivest, Shamir & Adleman ,Diffe-Hellman Key Exchange Algorithm,Digital S...
File system in operating system
Symmetric Key Cryptography 8. Introduction to Modern Symmetric Key Ciphers- DES, Blowfish, IDEA, AE...
Hash Function
Brief Presentation about message authentication codes and HMAC with requirements, functions and secu...
Basics of Networking Network Security Encryption standards & Algorithms Network security devices...
ASDSDSDASDSDFSF