![]() Music |
![]() Video |
![]() Movies |
![]() Chart |
![]() Show |
![]() | Internet time theft || Salami Attack || Lecture 6 || RGPV || Exams (Simply Made) View |
![]() | Salami attack/Salami Technique || lecture 6 || rgpv exam (ExamDev) View |
![]() | Defamation | Defamation in cyber security | cyber Defamation | Lecture 17 (Simply Made) View |
![]() | Email Spoofing | what is email spoofing | Lecture 4 | Rgpv | Exam (Simply Made) View |
![]() | Hacking | Types of Hacking | punishment of Hacking | Lecture 15 | Exams (Simply Made) View |
![]() | Web jacking || web jacking in cyber crime || Lecture 7 (Simply Made) View |
![]() | Explain Web Jacking | Web Jacking | Cyber Security (Discuss with Jishan) View |
![]() | Online Fraud in cyber security | Lecture 11 (Simply Made) View |
![]() | Virtual Crime | Lecture 12 | RGPV (Simply Made) View |
![]() | Cyber Fraud | cyber fraud in cyber security | Lecture 16 (Simply Made) View |