in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
1506hi friends i am Manohar from hyderabad.i have recently completed MBA+SAP SD -now i am looking for a job-what is best way to get job? can get job as fresher? or with fake experience? i am in a confusion plz help how to approach companys or consultancy which can provide sap job? plzzzzzzzzzzz
1578what is the main field of bugzilla which we fill to report bug to any developers???give some brief description??
1 3212
How many types of Delete Actions are there in Standard Ax and define the use of each?
Does java isempty check for null?
What is a bloom filter and how does it help in searching rows?
What do you mean by operation scrap?
What are the new features acquired in yii2?
Explain taxonomy in drupal.
What is the main job of the arp?
Which sorting has less time complexity?
Is c# a technology?
How to get a list of CDROM drives on a computer?
HI can i know who is taking real time testing classes in banglore? i am preparing to put 3+year experience in testing if possible anybody give suggestions for preparing 3+exp
What is the max size of an object that can be uploaded through the s3 console?
What are the different types of frames tags used in html?
What is hash table in java?
What is the volatile keyword used for?