Microsoft SQL Server

Sort By:
Page 50 of 50 - About 500 essays
  • Decent Essays

    The War On Cyber Wars

    • 1298 Words
    • 6 Pages

    Want to launch an attack on someone who opposes your beliefs, demands, and anything else that can possibly be a point of conflict? All you have to do is “Google it”. It is possible that all you have to do to learn how to shut down your enemy’s ability to use the internet is an internet search engine search away and a little practice. An individual can learn how to write a virus or launch a full-blown distributed denial of service attack against the desired target with some light reading and little

    • 1298 Words
    • 6 Pages
    Decent Essays
  • Better Essays

    The article “Cloud Computing: State of the Art and Security Issues” is written by Shruti Chhabra and V.S. Dixit, published by ACM SIGSOFT on 3rd April 2015. The article appears to be a collection of basics terminologies for Cloud Computing along with some categories comparisons between various Cloud services available in the market. In an attempt to discuss various security issues related to Cloud Computing, the authors have divided the article into nine areas as summarized below. Under the Introduction

    • 1372 Words
    • 6 Pages
    Better Essays
  • Decent Essays

    In this technology era, it is essential to have a web presence to provide easy and convenient access to the clients. One of the services that is prominent is E-commerce, allowing the business to have a web frontend, which provides the same services as traditional commerce world. The rapid changing technology had provided the opportunity for the companies to reach to a wide variety of consumers not just across the nation but also throughout the world. Based on the observation of how a small-sized

    • 1476 Words
    • 6 Pages
    Decent Essays
  • Better Essays

    INVESTIGATION OF MYSQL DATABASE AND NEO4J DATABASE ZAHRAA MUSTAFA ABDULRAHMAN AL-ANI JUNE 2015 INVESTIGATION OF MYSQL DATABASE AND NEO4J DATABASE A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF ÇANKAYA UNIVERSITY BY ZAHRAA MUSTAFA ABDULRAHMAN AL-ANI IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN THE DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCEINFORMATION TECHNOLOGY PROGRAM JUNE

    • 9876 Words
    • 40 Pages
    Better Essays
  • Better Essays

    Abstract In today’s IT world, network security is starting to get more attention. In the past, companies’ network infrastructures were capable of managing low amounts of attacks on the network. This is not the case today. The number of online attacks is getting bigger and bigger. Today children from age 6 are capable of breaking into someone’s network system. For attackers, it does not matter whether it is a large or small business or an individual computer. If they find a glitch in the network,

    • 2633 Words
    • 11 Pages
    Better Essays
  • Better Essays

    LITERATURE REVIEW …………………………………………………….... 4 2.1 Data……………………………………………………………………………4 2.2 Database……………………………………………………………………….4 2.3 Relational Database Management System.........................................................4 2.4 Structure Query Language (SQL)……………………………………………..6 2.4.1 Normalization …………………………………………………………8 2.5 NoSQL System………………………………………………………………..9 2.6

    • 10206 Words
    • 41 Pages
    Better Essays
  • Good Essays

    Front-end developer has an obligation for the interior design of a house that has been built by a back-end developer. The taste and style of the decor is dictated by the owner of the web page. The front end of a website is the section that users interact with and everything that one sees when you are navigating around the Internet including fonts, colors to dropdown menu. Computer’s browser controls Cascading Style Sheets and JavaScript Front-end developers are responsible for a website’s user-experience

    • 1757 Words
    • 8 Pages
    Good Essays
  • Good Essays

    various corporate espionage acts. In this modern world many multinational corporations are spying on another corporations to gather business secrets. From this assignment I have learned that various multinational corporations such as Google, the Microsoft Corporation, and Amazon etc. are spying on each other to gather business secrets. I have also learned that these corporations conduct espionage acts on each and every individual who works for them and who utilizes their services. One must be very

    • 1402 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Technical guide Database It is the collection of schemas, tables, queries, reports, views, and other objects. The data are typically organized to model aspects of reality in a way that supports processes requiring information, such as modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. It is a structured set of data held in a computer, especially one that is accessible in various ways. A database is a collection of information that is organized so

    • 1551 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Cyber Analytics – Machine Learning for Computer Security Arpitha Ramachandraiah, Team CRYPTERS, UBID: 5016 6499 Cyber security is in the forefront of every organizations’ core strategy to protect its data and information systems. This increased awareness about cyber security has been driven partly due to the increasing number of cyber-attacks and also due to the various government regulations such as HIPAA, SOX, PCI and so forth. Unlike in the past, attacks on organizations are more targeted, organized

    • 1570 Words
    • 7 Pages
    Good Essays