Mile2’s C)ISSO vs. ISC’s CISSP®

0
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP? It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...

Represent Decimal > 8-Bit Notation

0
Denoting decimal ( Base 2 )  numbers into 8-Bit Binary Notation eg.    255  in binary  =  11111111         16     in binary  =  00010000

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...

Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...

Normalization

0
It deals with the database design problem Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...

Database Transaction

0
Database Transaction Transaction is a Collection of operations that forms a single logical unit of work. A transaction is an atomic unit of work that...

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

IPv4 Classes

0
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...

What Is Network Topology And What Are Its Different Types?

0
What is Network Topology? Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...