in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
when will triggars the at new event in abap and web dybn pro?
how do you generate source code for the automatic generation for receipt number
which one is the best practice using synchronization method or synchronization block
is possible to delete specific data in a row by using of sql query?
Hi Guys, This is Rama, right now I am working as a Software Test Engineer in Gurgoan and I have over all 3 years of testing expoeriance. Right now I am looking for a change. Can any body help me out to find a job in south india. Thanks in Advance
1. Write a program to create a sentence at runtime and count number of vowels in it ? 2. Write a program to get a string and to convert the 1st letter of it to uppercase ?
in cobol,wat is the difference in using 'set index in occurs clause' ....and 'occurs depending-on clause'
What is the maximum amount of memory any single process on Windows can address? Is this different than the maximum virtual memory for the system? How would this affect a system design?
How many types of list exist in the HTML
What is abstract Method i want the exact definition and is there any possibility to declare class as abstract without any abstract methods in that class?If it is possible then tell me why and how?
How to merge Action Form with Dyna Action Form in Struts.
What is SOLID Principle in Programming Language?