in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?
1519hi friends i am Manohar from hyderabad.i have recently completed MBA+SAP SD -now i am looking for a job-what is best way to get job? can get job as fresher? or with fake experience? i am in a confusion plz help how to approach companys or consultancy which can provide sap job? plzzzzzzzzzzz
1586what is the main field of bugzilla which we fill to report bug to any developers???give some brief description??
1 3226
Write a program to include the custom button with the form
What is the purpose of render method of react-dom?
What can be the size of largest dataset in SAS?
What is bcp? When does it used?
Is Scala a Pure OOP Language? or Java a Pure OOP Language?
What is jstl core tags?
Why middleware is used in laravel?
What is difference between application and web application?
In case of embedded Hive, can the same metastore be used by multiple users?
Define clr?
Which of these functions is safer to use : fgets(), gets()? Why?
What do you mean by Data mining?
What does the ctrl I shortcut key accomplish in ms word?
Do you know in voip telephone witch part will convert data anolog to digital, digital to anolog?
Where is the Mapper Output intermediate kay-value data stored ?