JSiMS Free Video Lectures JSiMS Free Video Lectures
SignUp Login 10

Latest Videos


53.5K 23:00 CS606_Lecture45

CS606_Lecture45

53.5K 23:00 CS606_Lecture44

CS606_Lecture44

53.5K 23:00 CS606_Lecture43

CS606_Lecture43

53.5K 23:00 CS606_Lecture42

CS606_Lecture42

53.5K 23:00 CS606_Lecture41

CS606_Lecture41

53.5K 23:00 CS606_Lecture40

CS606_Lecture40

53.5K 23:00 CS606_Lecture39

CS606_Lecture39

53.5K 23:00 CS606_Lecture38

CS606_Lecture38

53.5K 23:00 CS606_Lecture37

CS606_Lecture37

53.5K 23:00 CS606_Lecture36

CS606_Lecture36

Search


  • Night mode
  • Sign In
  • Sing Up
Please Wait

Loading

Click Here To Watch

K views

Upnext

20.8K 23:00 What is Information security

What is Information security

20.8K 23:00 Information security Terminologies

Information security Terminologies

20.8K 23:00 Privacy issues

Privacy issues

20.8K 23:00 Computer Virus : What is Virus and How it Spread

Computer Virus : What is Virus and How it Spread

20.8K 23:00 Worm , Adware , Spyware , Malware

Worm , Adware , Spyware , Malware

20.8K 23:00 Symptoms of Virus Attack

Symptoms of Virus Attack

20.8K 23:00 Malware protection

Malware protection

20.8K 23:00 Downloading and Installation of Antivrus

Downloading and Installation of Antivrus

20.8K 23:00 Authorized access and Unauthorized Access

Authorized access and Unauthorized Access

20.8K 23:00 Difference between Authorization and Aunthentication

Difference between Authorization and Aunthentication

20.8K 23:00 Authentication Methodologies : Password and Pin Number

Authentication Methodologies : Password and Pin Number

20.8K 23:00 Access Card and Biometrics

Access Card and Biometrics

20.8K 23:00 Multi Model Aunthentication

Multi Model Aunthentication

20.8K 23:00 Guidelines for Use of Computer

Guidelines for Use of Computer

20.8K 23:00 Areas of Computer Ethics : Information Accuracy

Areas of Computer Ethics : Information Accuracy

© 2020 JSiMS. All Rights Reserved.