supply chain management Process view.ppt supply chain competitive and SC strategy.ppt SupplychainManagemnet and logitics(evolution).pdf job opportunities and knowledge in SCM.pdf Application layer protocols-SMTP Unit-V.ppt application layer protocols DNS,SNMP,web service.ppt CYBER FORENSICS-scanning and enumuration.ppt cyber forensics-ethical hacking- wireless-hacking.ppt SCM-supply chain management of toyota.pdf types and DOS attack & basics of denial of service.pdf phishing and dumpster diving attacks in socialengineering.pdf difference and types in sessionhijacking.pdf cyber security-ethical hacking web servers.pdf computer netwok security Pretty Good Privacy PGP.ppt communication & collaboration model in HCI.ppt T2 CEH Official Certified Ethical Hacker Review Guide .pdf ( PDFDrive ).pdf