Why do you require security policy?
Why do you require security policy?
April 23, 2010
SPEC INDIA
Secure system planning and administration is the human side of computer security. Even in a highly trusted system, security isn’t automatic. Administrators need a written guideline, spelled out...
CMP Versus BMP
CMP Versus BMP
April 15, 2010
SPEC INDIA
The EJB container handles persistence for entities with CMP, requiring the developer only to implement any logic and define the bean properties to be persisted. In EJB 2.0,...
What is Cryptography and Encryption?
What is Cryptography and Encryption?
April 9, 2010
SPEC INDIA
Encryption is the process of scrambling data (or plain text) into an unreadable form (or cipher text). This scrambling process is based on algorithms that use various forms...
What are Viruses?
What are Viruses?
April 2, 2010
SPEC INDIA
A virus is a code fragment that copies itself into a larger program, modifying that program. Unlike a worm, described in the next section, a virus is not...

Subscribe Now For Fresh Content

Popular Blogs

Guest Contribution

We are looking for passionate industry experts to contribute thought leadership blogs.

Write For Us

Our Portfolio

Proven Solutions Across Industries
Technology for Real-Life

Visit Our Portfolio