EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-07-06, 768👍, 3💬
Lock Types and Lock Levels
This section describes 2 types of locks: Read Lock (Shared Lock) and Write Lock (Exclusive Lock), and 3 levels of locks: Table Lock, Row Lock, and Column Lock. 2019-01-02, 2212👍, 2💬
Introduction of SQL
This chapter provides notes and tutorial examples on SQL. Topics include introduction of SQL (Structured Query Language); history and revision of SQL; terminologies related to SQL and database. 2016-08-28, 226👍, 1💬
Using MySQL Noinstall Package
This section provides a tutorial example on how to download and install MySQL 5.7.10 noinstall package on a Windows system. Configuration is required to start MySQL 5.7.10 server. 2016-04-08, 3636👍, 5💬
GROUP BY Clause of a SELECT Statement
This section provides tutorial examples on how to use the GROUP BY clause to aggregate orginal rows of the base table into group rows in a SELECT statement. 2015-09-27, 848👍, 1💬
This section describes how to insert BLOB values as normal strings using INSERT statements.
This section provides a tutorial example on how to see the list of trusted root CA (PKI Authorities)...
This section describes the Base64 encoding algorithm with some simple encoding examples.
Want to know when is the 2018 Chinese New Year day? Looking for Chinese calendars for 2018? Chinese ...
This section describes the MD5 algorithm - a 5-step process of padding of '1000...', appending messa...