Suraj Rajak
Nishant Sawant
Gaurav Gupta
Cyber Forensics
A buffer overflow
Virtual Machine
what is shedding and why it happens?
What is a Malware ?
What is main advantages of the layered Approach to the system design? What are the disadvantages of using the layered approach?
|
No blogs posted