Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, p... 2017-06-14, 13728👍, 3💬
Lock Types and Lock Levels
This section describes 2 types of locks: Read Lock (Shared Lock) and Write Lock (Exclusive Lock), and 3 levels of locks: Table Lock, Row Lock, and Column Lock. 2016-10-31, 547👍, 1💬
Introduction of SQL
This chapter provides notes and tutorial examples on SQL. Topics include introduction of SQL (Structured Query Language); history and revision of SQL; terminologies related to SQL and database. 2016-08-28, 151👍, 1💬
Using MySQL Noinstall Package
This section provides a tutorial example on how to download and install MySQL 5.7.10 noinstall package on a Windows system. Configuration is required to start MySQL 5.7.10 server. 2016-04-08, 2095👍, 5💬
GROUP BY Clause of a SELECT Statement
This section provides tutorial examples on how to use the GROUP BY clause to aggregate orginal rows of the base table into group rows in a SELECT statement. 2015-09-27, 718👍, 1💬
This section describes 'adb push' and 'adb pull' commands, which allows you to copy files to and fro...
This chapter provides tutorial notes and example codes on WSDL2Java. Topics include using the WSDL2J...
This cryptography tutorial book is a collection of notes and sample codes written by the author whil...
This section provides quick introductions on the Windows registry hives - top level registry keys on...
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending mess...