2024-06-25
|
ClassLecture
|
5
|
3
|
PASSWORD CRACKING
|
2024-06-14
|
ClassLecture
|
5
|
3
|
Virtual private network
|
2024-06-03
|
ClassLecture
|
5
|
2
|
Mobile device registry setting
|
2024-05-30
|
ClassLecture
|
2
|
2
|
How to protect social engineering
|
2024-05-24
|
ClassLecture
|
5
|
2
|
Attack on mobile and cell phones
|
2024-05-23
|
ClassLecture
|
5
|
2
|
Wireless computing era
|
2024-05-22
|
ClassLecture
|
5
|
2
|
Wireless computing era
|
2024-05-20
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-18
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-16
|
ClassLecture
|
4
|
2
|
Trends and mobility
|
2024-05-15
|
ClassLecture
|
4
|
2
|
Proliferation of mobile and wireless device
|
2024-05-14
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-13
|
ClassLecture
|
4
|
2
|
Features andv wire less device
|
2024-05-08
|
ClassLecture
|
4
|
2
|
Features of wireless device
|
2024-05-06
|
ClassLecture
|
4
|
2
|
Wireless device
|
2024-05-03
|
ClassLecture
|
4
|
1
|
Cyber cafe in cyber security
|
2024-05-02
|
ClassLecture
|
4
|
1
|
Social engineering
|