Mile2’s C)ISSO vs. ISC’s CISSP®
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP?
It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...
Represent Decimal > 8-Bit Notation
Denoting decimal ( Base 2 ) numbers into 8-Bit Binary Notation
eg. 255 in binary = 11111111
16 in binary = 00010000
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
Making Sense of NoSQl
Book Description:
If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...
Normalization
It deals with the database design problem
Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...
Database Transaction
Database Transaction
Transaction is a Collection of operations that forms a single logical unit of work.
A transaction is an atomic unit of work that...
Hacking is crime or not?
Hacking:
Is an art of gaining unauthorized access into any system either by hook or by crook!
This is the definition what everyone think. But according to...
IPv4 Classes
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...
What Is Network Topology And What Are Its Different Types?
What is Network Topology?
Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...

