Why do you require security policy?
Why do you require security policy?
Secure system planning and administration is the human side of computer security. Even in a highly trusted system, security isn’t automatic. Administrators need a written guideline, spelled out...
Apr 23, 2010
SPEC INDIA
CMP Versus BMP
CMP Versus BMP
The EJB container handles persistence for entities with CMP, requiring the developer only to implement any logic and define the bean properties to be persisted. In EJB 2.0,...
Apr 15, 2010
SPEC INDIA
What is Cryptography and Encryption?
What is Cryptography and Encryption?
Encryption is the process of scrambling data (or plain text) into an unreadable form (or cipher text). This scrambling process is based on algorithms that use various forms...
Apr 9, 2010
SPEC INDIA
What are Viruses?
What are Viruses?
A virus is a code fragment that copies itself into a larger program, modifying that program. Unlike a worm, described in the next section, a virus is not...
Apr 2, 2010
SPEC INDIA

Guest Contribution

We are looking for industry experts to contribute to our blog section through fresh and innovative content.

Write For Us

Our Portfolio

Proven Solutions Across Industries
Technology for Real-Life

Visit Our Portfolio