Database Data Structure
Data Independence
The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
Mile2’s C)PTE vs. CEH®
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH?
To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
DBMS Overview
Overview of DBMS(Database Management System)
A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database.
DB(Database)...
Python Programming
Book Description:
You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Database Transaction
Database Transaction
Transaction is a Collection of operations that forms a single logical unit of work.
A transaction is an atomic unit of work that...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
IPC Section for Cyber Laws
IPC Section for Cyber Laws
Indian Penal Code for IT World
Section 378,379. Theft of Computer Hardware
Section 464. Making a False Document
Section 468....
Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...



