EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-01-01, 332👍, 1💬
Lock Types and Lock Levels
This section describes 2 types of locks: Read Lock (Shared Lock) and Write Lock (Exclusive Lock), and 3 levels of locks: Table Lock, Row Lock, and Column Lock. 2019-01-02, 1415👍, 2💬
Introduction of SQL
This chapter provides notes and tutorial examples on SQL. Topics include introduction of SQL (Structured Query Language); history and revision of SQL; terminologies related to SQL and database. 2016-08-28, 211👍, 1💬
Using MySQL Noinstall Package
This section provides a tutorial example on how to download and install MySQL 5.7.10 noinstall package on a Windows system. Configuration is required to start MySQL 5.7.10 server. 2016-04-08, 3458👍, 5💬
GROUP BY Clause of a SELECT Statement
This section provides tutorial examples on how to use the GROUP BY clause to aggregate orginal rows of the base table into group rows in a SELECT statement. 2015-09-27, 834👍, 1💬
This section provides a tutorial example on how to use SHA1 message digest algorithm in Java. The JD...
Please share your general comments on my tutorial books here. Comments should not contain hyperlinks...
This section provides a tutorial example on how to disable and remove 'Lync Browser Helper' addon fr...
This section provides a tutorial example on how to use the getSelection() method to know which butto...
This section describes how to delete rows from target tables through ResultSet objects.