Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
What is Mobile Database Security in information security?
A mobile database is said to be a database that can be related to by a mobile computing device over a mobile network .The client and server include wireless connections. A cache is maintained to hold recurrent information and transactions so that they are not lost due to connection failure.A database is a structured manner to organize data. This can be a list of contacts, price data or distance travelled. The application of laptops, mobiles and PDAs is increasing and possible to augment in the future with successively more applications locating in the mobile systems.Some applications like databases would require ...
Read MoreWhat is the need of database security in information security?
Database security contains securing the database from permitted access, alteration or elimination. Because the database defines an essential corporate resource, database security is an essential subcomponent of some organization’s complete information system security plan.Moreover the requirement to keep and secure information for the smooth services of the organization, database designers have the authority to secure the privacy of individuals about whom data is maintained.Privacy is the right of individuals to have some control over data about themselves. Some countries have laws designed to secure privacy, and each organization that collects and stores data about individually is legally obliged to adopt ...
Read MoreWhat are the drawbacks of database security?
Database security defines the collective measures used to protect and secure a database or database management software from unauthorized use and malicious cyber threats and attacks. Database security is a layer of information security. It is basically concerned with physical protection of information, encryption of data in storage and data remanence problem.Securing the database is a basic principle for some security workers while mounting the security plan. The database is a compilation of beneficial information and can be treated as the most important constituent of an organization and its economic enlargement.Accordingly, some security effort should remember that they need to ...
Read MoreWhat are the levels of database security in information security?
Data security defines the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security involves data encryption, hashing, tokenization, and key administration practices that secure data across some applications and platforms.Security database professionals have to depend on network management for implementing firewalls or other structure to defend local information as the nature of Intranet/Internet data access is though the database administrator (DBA) has to carry out some security function. This unit will scrutinize the fundamental security areas that fall within the area of the DBA, who then has to create database familiarized solutions.The security of ...
Read MoreWhat is the principles of database security in information security?
Database security defines the collective measures used to protect and secure a database or database management software from unauthorized use and malicious cyber threats and attacks. There are various principles of database security which are as follows −Security models − A security model creates the external element for the examination of security problems in general, and supports the context for database considerations, such as implementation and operation.Access control − The objective of access control should always be clear. Access control is costly in terms of analysis, model and operational costs. It can be used to known situations, to known standards, ...
Read MoreWhat are the types of threats in a database?
There are various types of threats which are as follows −Unauthorised modification − It can be changing data values for reasons of sabotage, crime or ignorance which can be allowed by inadequate security structure, or sharing of passwords or password guessing.Unauthorised disclosure − When the information should not have been revealed. A general problem of central importance, which can be accidental or deliberate.Loss of availability − When the database is not available it acquire a loss. Therefore any threat that provides rise to time offline, even to check whether something has appeared, is to be avoided.Commercial sensitivity − Some financial ...
Read MorePartition Problem in C++
In this problem, we must build C++ code to determine whether or not an array may be divided into two equal subarrays. Also, we have to check the condition if the sum of all the elements in both subarrays is exactly the same or not. The partitioning problem is a variant of the Subset Sum Problem, which is in turn a variant of the Knapsack Problem. We'll use the C++ programming language to tackle the partition problem. We must return a string with a Yes or No depending on whether the specified condition is fulfilled or not.Inputarr[] = {6, 4, ...
Read MoreHow to apply integer division to the pandas series by a scalar?
The operation integer division is also called floor division, which is equivalent to // in python. And it is a binary operation nothing but an element-wise division operation that returns a new value.In the pandas series class, there is a method called floordiv() which performs the element-wise integer division operation between a series object and a scalar. And this method can also be used to perform floor division between two series objects.The output of this method is a new series with the result of the operation. And it has 3 parameters, which are fill_value, other, and level. The other parameter ...
Read MoreHow to apply floor division to the pandas series object by another series object?
The floordiv() method in the pandas series constructor is used to perform integer division of two series objects (an element-wise division operation) and the Floor Division operation is also called Integer Division, which is equivalent to // in python. The method supports the substitution of missing values in any of the inputs.The method returns a series with resultant values, and the method has 3 parameters, which are fill_value, other, and level. The other parameter is nothing but the 2nd input object either series or a scalar.The fill_value parameter is used to replace a specific value in the place of missing ...
Read MoreHow to get the final rows of a time series data using pandas series.last() method?
The pandas series.last() method is used to return final periods based on the date offset. By applying this series.last() method we can get the final periods of the time series object. The last method is very similar to the pandas series.first() method, here we can get the final periods instead of the initial periods.The series.last() method has a parameter called offset which is used to mention the length of the offset data to select the rows within the given limit.The last() method will return a now Series object with resultant rows and it will raise the TypeError if the index ...
Read More