Database Data Structure

0
Data Independence The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...

Masking and IP Addressing format

0
Types of Addressing Classful Addressing Classless Addressing Classful Addressing  IPv4 uses concept of classes. This architecture is called classful addressing  Types of Classes                                 Class...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...

DBMS Overview

0
Overview of DBMS(Database Management System) A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database. DB(Database)...

Python Programming

0
Book Description:  You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...
linux-security-bug

Linux kernel vulnerability discovered

0
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...

Database Transaction

0
Database Transaction Transaction is a Collection of operations that forms a single logical unit of work. A transaction is an atomic unit of work that...
Database Users

Database Users

0
Database End Users End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...

IPC Section for Cyber Laws

0
IPC Section for Cyber Laws Indian Penal Code for IT World Section 378,379. Theft of Computer  Hardware Section 464. Making a False Document Section 468....
Web-Hosting

Internet and Domain Hosting

0
What is web hosting? Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...