Wednesday, 31 August 2022

Data analysis by A. Anna Lakshmi


 

Cyber Security study on attack threat vulnerability by N. Selvi, V. Selvi


 

Cyber security in India by M. Raja Lakshmi, K. Raveena


 

Cyber Security by P. Ranjith Kumar, P. Ravichandran


 

Cyber Security in India by G. Mathan Rajan, M. Ranjith Kumar


 

Computer hardware by S. Durga devi, K. Amirtha Lakshmi


 

Computer Hardware by S. Arjunan, K. Bala


 

Big data application by G. Renuka Devi, S. Yamini


 

Application of big data in real life by G. Renuka Devi, S. Yamini


 

Amazon web services by P. Kaleeswaran, M. Bala Sivanesh


 

3rd generation of computer by A. Sanjeevi, R. Sakthivel


 

3rd generation features by M. Muthubharathalakshmi, M. Muthulakshmi



 

                                                                                                                                            ...