Sai KameshParameters to consider while designing mobile device security policyThe Mobile security policy should take into account the risk of working with mobile devices in unprotected environments.Sep 19, 2021Sep 19, 2021
Sai KameshStragtegies for development of women entrepreneursIn small and medium enterprises, due to limited resources majority of functions are performed by the owner himself.Sep 19, 2021Sep 19, 2021
Sai KameshCauses of Industrial SicknessThe causes of industrial sickness in india may vary from one unit to other unit. Tiwari Committe report outlines the causes of industrial…Sep 19, 2021Sep 19, 2021
Sai Kamesh7 P’s of Service MarketingService marketing mainly comprises of 7 P’s. The 7 P framework is one of the most popular framework for deciding a marketing strategy…Sep 19, 2021Sep 19, 2021
Sai KameshRSA Algorithm explained simplyRSA algorithm is a asymmetric key cryptography algorithm. Asymmeteric means that it uses two different keys i.e public key for encryption…Mar 26, 2021Mar 26, 2021
Sai KameshSECURITY ATTACKSA security attack is an unauthorized attempt to steal, damage, or expose data from an information system such as your computer or website.Feb 19, 2021Feb 19, 2021
Sai KameshElGamal Algorithm in layman’s termsThe ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman…Jan 15, 2021Jan 15, 2021
Sai KameshHere is How to send WhatsApp messages without adding the contact to address book.Open your phone’s web browser and paste this link – ‘https://api.WhatsApp.com/send?phone=number’ in the Address bar.Dec 11, 2018Dec 11, 2018
Sai KameshWhat is the weird colon-member (“ : “) syntax in constructor?It’s a member initialization list.Dec 1, 2018Dec 1, 2018