Author Archives: 5 Minutes Engineering

Intrusion Detection System (IDS) ll Types Of Intruder Explained in Hindi

June 1st, 2020 📆 | 1969 Views ⚑

πŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“š GOOD NEWS FOR COMPUTER ENGINEERS INTRODUCING 5 MINUTES ENGINEERING πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“ SUBJECT :- Discrete Mathematics (DM) Theory Of Computation (TOC)

Tagged with: β€’ β€’ β€’ β€’ β€’ β€’ β€’ β€’




Asymmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi

March 3rd, 2019 📆 | 3837 Views ⚑

πŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“š GOOD NEWS FOR COMPUTER ENGINEERS INTRODUCING 5 MINUTES ENGINEERING πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“ SUBJECT :- Discrete Mathematics (DM) Theory Of Computation (TOC)

Tagged with: β€’ β€’ β€’ β€’ β€’ β€’




Symmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi

March 3rd, 2019 📆 | 2145 Views ⚑

πŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“š GOOD NEWS FOR COMPUTER ENGINEERS INTRODUCING 5 MINUTES ENGINEERING πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“ SUBJECT :- Discrete Mathematics (DM) Theory Of Computation (TOC)

Tagged with: β€’ β€’ β€’ β€’ β€’ β€’




Security Goals : Confidentiality,Integrity,Availability Explained in Hindi

February 21st, 2019 📆 | 1749 Views ⚑

πŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“šπŸ“š GOOD NEWS FOR COMPUTER ENGINEERS INTRODUCING 5 MINUTES ENGINEERING πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“πŸŽ“ SUBJECT :- Discrete Mathematics (DM) Theory Of Computation (TOC)

Tagged with: β€’ β€’ β€’ β€’ β€’ β€’