in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
Is class is a abstract datatype in java?
they asked me about srs (software requirement specifcation)? how can i get anydocumentation about srs & other documnts infomation like bdd, in testing? its urgent?
public static void main(String args[]) describe it
Delta 5 weight scale not connect with oracle application what i can do?
how will you code the subfile which is in editing mode (multiple case subfile)?
difference between mantis and other tools?
what is the purpose of checked Menu options
what is the diff bw sql direct and jdbc update can't we do select and updating operation in sql direct
CPU - abbrevation
Need provab technical test questions
I am taking the bmc control m/enterprise manager 7.0 scheduling test and just wanted to see what kind of questions they would ask or if anyone has taken the test and how long it is for how many questions?
Why COBOL/400 is giving 95 session error when opening a file even though the file is having key and the screen or display file is having IND ARA defined?