Near Field Communication (NFC) Near Field Communication is referred to as NFC in short. It is used for short-range data communication between two devices known as initiator (e.g., an NFC...
Relational Database The relational model is one of the most widely used database models. It was created in 1969 by Edgar Codd. For the specification of data and queries, this...
Java: Introduction Java has been introduced for network programming and has been the most used programming language for more than 20 years. Furthermore, because Java consistently performs well for application...
SQL Injection Attack SQL injection, sometimes referred to as SQLI, is a popular attack method that use malicious SQL code to manipulate backend databases and access data that was not...
Introduction The internet of things is a concept that describes the connection of everyday objects to the internet. It can be used to track and monitor your mobile phone, home...
Artificial Intelligence : Introduction Artificial intelligence (AI) is the intelligence that machines display and may be programmed to mimic human behavior or thought processes. Deep Learning and machine learning methods...
Digital Forensics : Introduction Digital forensics is the science of analysing and extracting digital evidence from computers and storage devices, such as hard drives, cell phones, PDAs, and other electronic...
Introduction A man in the middle attack is a type of cyber-attack where the attacker inserts themselves into a communication between two parties in order to eavesdrop or tamper with...
Data Science : Introduction Data science is an interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from data in various forms, both structured...