1:05:06SLR Step by Step guide on Systematic Literature Review with practical examplesSRKohinoor's Live181 views·1 year ago
9:10A Farewell Tribute from 60A Students CSE, Leading UniversitySRKohinoor's Live535 views·2 years ago
24:44Recursion in Python A Comprehensive Guide for Beginners Batch 62ESRKohinoor's Live78 views·2 years ago
1:10:01CyberSafe Training, Lecture 2 - Attacks, Concepts and TechniquesSRKohinoor's Live42 views·3 years ago
46:31CyberSafe Training, Lecture 3 - Protecting Your Data and PrivacySRKohinoor's Live26 views·3 years ago
1:14:50CyberSafe Training, Lecture 4 - Protecting the Organization by Professor Touhid BhuiyanSRKohinoor's Live76 views·3 years ago
1:16:24Priority Scheduling, Round Robin & Short Review on Chapter 2 & 3SRKohinoor's Live687 views·3 years ago
40:31Asymptotic Notations and Random Access Machine, CSE2117 Sp22SRKohinoor's Live155 views·4 years ago
37:42Studying in Canada and Career Prospects of Cyber Security, Mrinmoy PurkayasthaSRKohinoor's Live55 views·4 years ago