Database Data Structure
Data Independence
The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...
Linux in a Nutshell, 6th Edition
Book Description:
Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...
What Is Network Topology And What Are Its Different Types?
What is Network Topology?
Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...
Python Programming
Book Description:
You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
MAC
MAC ( Media Access Control ) Address
Address of any network card
eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc..
MAC...
Linux Server Hacks
Book Description:
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...
Oracle Inside
Oracle Architecture
Basically, these are two main components of ORACLE Database Architecture.
Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
Hacking is crime or not?
Hacking:
Is an art of gaining unauthorized access into any system either by hook or by crook!
This is the definition what everyone think. But according to...


