PDA

View Full Version : Engineering Concepts


  1. Introduction to Natural Language Processing(NLP)- part 1
  2. Introdution to Natural language processing (NLP) - part 2
  3. introduction to Natural Language Processing (NLP)-part3
  4. Virtual Network Computing (VNC)
  5. Introduction to Fuzzy Systems
  6. Arbitrary Precision Arithmetic
  7. Artificial Intelligence (LISP)
  8. Why Are Attachments Encoded?
  9. What's the buzz on GSM?
  10. SSL in brief
  11. Types of Attacks on Web Servers
  12. MD5 Tutorial
  13. Types of Server
  14. Wireless Application Protocol
  15. Using Rundll32.exe in Windows XP
  16. The Trojan "Horse"
  17. Difference Between Adware & Spyware
  18. DCOM & related technologies
  19. How Ciphers Work
  20. Denail of Service (DoS)
  21. What Are Web Services?
  22. Most Common TCP Ports
  23. Difference bwteen switching and routing
  24. What Makes Up a Hard Drive
  25. How Virtual LANs (VLANS) Work
  26. What is a firewall?
  27. USB Basics
  28. Blu-Ray Technology
  29. Some Networking Questions
  30. What Is VoIP and How Does It Work
  31. Jargon Buster
  32. All About Bits & Bytes
  33. Storage Architectures
  34. Computer Viruses
  35. Jargon Buster [A-M]
  36. IP Addresses Explained
  37. Beep beep beep - a nice muzical experience
  38. Denail of Service (DoS)
  39. OOP and UML
  40. Converting Between Numeric Bases
  41. Which One Is Better: PNG or GIF?
  42. Prevent DNS Server from being used for a DoS attack
  43. Transport Layer Security (TLS)
  44. Packet Sniffers
  45. Multithreading
  46. Does IP Address Reveal My Physical Location?
  47. Design Pattern in Simple Examples
  48. What is a binary-safe function?
  49. Check For Open Relay Using Telnet
  50. Types of Object Copy
  51. Enabling SSL on IIS with a self-signed certificate
  52. The background view of Multicore Computing Technology
  53. Behind the Browser !
  54. Vogel Approximation Method
  55. Basics of Pocket PC
  56. Brain Machine Interfacing Technology
  57. Know and Update your Mobile Software
  58. Few TCP/IP Utilities with Examples
  59. Deadlock
  60. Process Management And Synchronization
  61. Web X.0
  62. Concept of Virtual Memory - What and Why
  63. AMD Fusion - Accelerated Processing Unit (APU), New Era in Computing
  64. An Introduction to Cryptography
  65. Understanding Symmetric-Key encryption
  66. Data Encryption Standard (DES) Algorithm
  67. Introduction to Bouncy Castle APIs
  68. Understanding Public Key Infrastructure
  69. Understanding AES Advanced Encryption Standard
  70. Bouncy Castle - .Net Implementation - RSA Algorithm
  71. Bouncy Castle - .Net Implementation Triple DES Algorithm
  72. Digital Certificates and Smart Cards
  73. Digital Certificate formats and filename extensions
  74. Cyclomatic Complexity Calculations ( CC )
  75. Introduction to Git VCS
  76. Amazon Simple Queue Service
  77. Git VCS - Cloning & Workflow
  78. Faster Webapps with Memcached
  79. Recovering Lost Hard Disk Data With ddrescue
  80. Introduction to Lossless Audio Encoding
  81. An Introduction To DKIM
  82. cgit: A Web Interface for Git
  83. Git Tips and Tricks
  84. Big Data Analytics Will It Be The Hub For Future Technology Services?
  85. Understanding and Using SPF
  86. Load Balancing with HAProxy
  87. Basics of Computer Network Fundamentals
  88. Sending Push Notifications on iOS using APNS & PHP