32 دیدگاه برای “NETWORK SECURITY – BASIC CONCEPTS”
Sir where z ua lecture about descrete logarithm.?? I need it
Good explanation sir..make more videos on information security.. thankyou
SIR UR VIDEOS ARE AWESOME , CAN U PLS UPLOAD A VIDEO ON INS SECURITY FRAMEWORK AND CONTENGENCY PLANNING.EXPECTING A QUICK REPLY 🙂
brilliant video
Sir Ur lectures are awesome they helps me alot plzzzzz send the SHA-1 ALGORITHM also….
superb explanation sir, thanq so much for these tutorials god bless u and every lecture of urs deseves equal number of views and likes once again tq sooooo much
Sir video bahut accha hii….. Lekin hindi me hota to jyada samajh me aata
Excellent Excellent Excellent Great Sir, u have made me possible to study Network security. I am very statisficaion that i got a good teacher in years. i have gone through every books and videos but network security is difficult to understand . u have made me clear understanding of security to me . God Bless You sir.
Sir what does it mean that the key must form pair
grt sir ur explanation is very esay to understand…thank u…
nice
nice video but sir we want compiler construction cource
Very very nice my teacher
Sir one doubt program wise algorithm different ah sir Ex. WhatsApp and Facebook Encryption is indidual program sir
Thank you so much for the breakdown. I am now a SUBSCRIBER! Please keep up the great work!
It was very nice explaination . Thank you so much . Keep up the good work!!!!!!
I have on doubt here.
But here which key [ public or private key ] should be used for encryption and which key should be used for Decryption [ public key or private key].?
Sundeep … lot of people are smart themselves but not everyone can teach well…you are so unique the way you recap and underline points is amazing…it almost took me in engineering class mamories 24 years back ..Thanks for sharing your knowledge.
Hi Sir,
This Video is very useful for me.Can you please make Video about packet flow in ASA Firewall which will be helpful for me.
thanks Sir
thanku so much sir for this video. basic concept regarding system security is now clear can u upload video on software testing and quality assurance?
wow! Amazing lecture. Can you Please make a video series for python>>>>> Please
Very clear and understandable video, request to make video on different type of algorithms along with their vulnerability study
i need your adivecs what the best books for netwokimg security ,,,may i have your mail .sir
my teacher indian they are the best really its clear ,, you are the best thank u
Great tutorial, please upload next video………………………………………………..please.
vry nice sir.kindly make complete vidio on network security.
Appreciate if you also provide the example and application of the concepts
Sir where z ua lecture about descrete logarithm.?? I need it
Good explanation sir..make more videos on information security.. thankyou
SIR UR VIDEOS ARE AWESOME ,
CAN U PLS UPLOAD A VIDEO ON INS SECURITY FRAMEWORK AND CONTENGENCY PLANNING.EXPECTING A QUICK REPLY 🙂
brilliant video
Sir Ur lectures are awesome they helps me alot
plzzzzz send the SHA-1 ALGORITHM also….
superb explanation sir, thanq so much for these tutorials god bless u and every lecture of urs deseves equal number of views and likes once again tq sooooo much
Spr sir
asi video hindi me bhi banao na sir
Really good. well explained my friend . Thanks
https://youtu.be/6qpudAhYhpc
Good and clear explanation Thanks Sundeep.
Sir video bahut accha hii….. Lekin hindi me hota to jyada samajh me aata
Excellent Excellent Excellent Great Sir, u have made me possible to study Network security. I am very statisficaion that i got a good teacher in years. i have gone through every books and videos but network security is difficult to understand . u have made me clear understanding of security to me . God Bless You sir.
Sir what does it mean that the key must form pair
grt sir ur explanation is very esay to understand…thank u…
nice
nice video but sir we want compiler construction cource
Very very nice my teacher
Sir one doubt program wise algorithm different ah sir
Ex. WhatsApp and Facebook Encryption is indidual program sir
Thank you so much for the breakdown. I am now a SUBSCRIBER! Please keep up the great work!
It was very nice explaination . Thank you so much . Keep up the good work!!!!!!
I have on doubt here.
But here which key [ public or private key ] should be used for encryption and which key should be used for Decryption [ public key or private key].?
Sundeep … lot of people are smart themselves but not everyone can teach well…you are so unique the way you recap and underline points is amazing…it almost took me in engineering class mamories 24 years back ..Thanks for sharing your knowledge.
Hi Sir,
This Video is very useful for me.Can you please make Video about packet flow in ASA Firewall which will be helpful for me.
thanks Sir
thanku so much sir for this video. basic concept regarding system security is now clear can u upload video on software testing and quality assurance?
wow! Amazing lecture. Can you Please make a video series for python>>>>> Please
Very clear and understandable video, request to make video on different type of algorithms along with their vulnerability study
i need your adivecs what the best books for netwokimg security ,,,may i have your mail .sir
my teacher indian they are the best really its clear ,, you are the best thank u
Great tutorial, please upload next video………………………………………………..please.
vry nice sir.kindly make complete vidio on network security.
Appreciate if you also provide the example and application of the concepts
Very nice explanation sandeep..!! great work.!!