Database Data Structure

0
Data Independence The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...
linux

Linux in a Nutshell, 6th Edition

0
Book Description: Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...

What Is Network Topology And What Are Its Different Types?

0
What is Network Topology? Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...

Python Programming

0
Book Description:  You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...
linux

Linux Server Hacks

0
Book Description:  Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...