in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
what are the steps for creating prompt table dynamically for the specified field
what is lazy loading in hibernate?Explain in detailed manner?
What is the difference between DECISION COVERAGE(DC) and MODIFIED CONDITION/DECISION COVERAGE(MCDC)?
swap two number wthout using third variable
two MIT math grads bump into each other at Fairway on the upper west side. they haven't seen each other in over 20 years. the first grad says to the second: "how have you been?" second: "great! i got married and i have three daughters now" first: "really? how old are they?" second: "well, the product of their ages is 72, and the sum of their ages is the same as the number on that building over there.." first: "right, ok.. oh wait.. hmm, i still don't know" second: "oh sorry, the oldest one just started to play the piano" first: "wonderful! my oldest is the same age!" problem: how old are the daughters?
Please forward important interview and basic questions in VB6 on my email id: usneha_16@yahoo.co.in
What is the difference between CriteriaQuery and CreateQuery in Hibernate???? Thanks in advance!!!!!!
what are the top level class of interface in java?
smal talk is pure object oriented or not?
1.how to deploy the Maven application in weblogic server? 2.In Real time projects all classes are singleton or some classes only singleton explain? 3.what are the major uses of the designpatterns? 4.explain restful &Soap based services explain?
can we retrieve only integer/String type columns from a table,if yes how?
what is the difference between rename and label