Posts

Showing posts from December, 2024

Wrapper Class

⋮ Mindvault360 Introduction to Java FEATURES OF JAVA OOPS Concepts Java Tokens Java statements Java Datatypes Type Casting Operators Expression, Scanner Class and Control Structures Control Statements in Java Loops in Java Functions in Java Arrays in Java Java String Java Regex Java Methods Java Constructor Java Modifiers Java Inheritance Java Abstraction Java Encapsulation Java Polymorphism Java Interface Java Recursion Java Final Class Java Keywords Java Inner Class Java Singleton Class Java Object Class Java Garbage Collection and Finalize Class Java Enumeration Multithreading Life cycle of a thread Thread Priority Thread Scheduler Thread.sleep() in Java Java join() method Daemon Thread in Java Java Thread Pool ThreadGroup in Java Java Shutdown Hook Java Runtime class Synchronization in Java Deadlock in Java Inter-thread Communication in Java Exception in Java Date and time class in Java Java FileStream Seria...

Database Model

Image
⋮ Mindvault360 CYSA Introduction Cybersecurity Objectives Risk Evaluation Understanding Vulnerabilities, Threats, and Risks in Cybersecurity Risk Assessment Process Enterprise Security Architecture (ESA) Frameworks NIST Cybersecurity Framework (CSF) Overview Penetration Testing Process Footprinting: The First Step in Cyber Reconnaissance Open Source Intelligence (OSINT) in Cybersecurity Social Engineering: Exploiting Human Vulnerabilities Relational and object-relational models were the basis for the development of database technology. The principal Below is a list of database models:  Hierarchical Database model: The famous Hierarchical database model was IMS(Information Management System). IBM's initial database management system. Each entry in this model contains information on the parent-child relationship in the form of a tree. In a relational model, the collection of records i...

Conditional Statements

⋮ Mindvault360 Introduction to Python Comments Variable in Python Python Datatypes Python Operators Conditional Statements Depending on whether a condition is true or false, conditional statements let you run specific code blocks. If, elif, and else are Python's main conditional statements. if statement: When a condition is checked by the if statement and found to be True, the corresponding block of code is run. Example: x = 10 if x > 5:     print("x is greater than 5") if-else Statement: when a condition is satisfied a specific code is executed and if the condition false the else block will be executed. Example: x = 3 if x > 5:     print("x is greater than 5") else:     print("x is less than or equal to 5") if-elif-else Statement: when we need to check for multiple condition, we can use this elif statement. Example: x = 7 if x > 10:     print("x is greater than 10") ...

Dynamic memory

⋮ Mindvault360 C++ Introduction Variables Comments in CPP OOP(Object-oriented programming) Basic input and output operations Tokens & Manipulators in CPP Control Structures in CPP Looping Statements Arrays in CPP Pointers in CPP File Operations in CPP Functions in C++ C++ String C++ math C++ Boolean Basic Syntax and Structure of C++ Dynamic memory Scope of Variable C++ The application can allocate memory at runtime instead of compile time thanks to C++'s dynamic memory allocation feature. When you don't know how much memory is required until the program is running, this is helpful. In C++, the new and delete operators are used to control dynamic memory: Memory is allocated on the heap using new, which also returns a pointer to the memory that has been allocated. To deallocate memory that was previously allocated with new, use delete. A samp...

Variables

⋮ Mindvault360 Introduction to C Features of C Datatypes in C Variables Structure of C Program Compiling and Executing C Program Basic Program in C Tokens in C STORAGE CLASSES in C I/O FUNCTIONS IN C DYNAMIC MEMORY MANAGEMENT Error handling in C Pointers C A variable is a container which holds the data or the value the user gives. variables are memory locations in a computer's memory to store data. variable is varying it can take different values during times during execution.  Every variable in C has three most fundamental attributes. They are: Name Value Address Guidelines for naming a variable: A variable must begin with either a letter or an underscore(_). C is a case sensitive, hence upper and lower case letters are treated as different. For example sum is different SUM Only “ _ “ is used as a special symbol, other symbols are not permitted. variable should not be a keyword. Valid...

Information Security & Essential Terminology

⋮ Mindvault360 Information Security & Essential Terminology Elements of Information Security The Security, Functionality, and Usability Triangle Information Security Threats and Attack Vectors Top Information Security Attack Vectors Information Security Threat Categories Information security is the process of preventing unauthorized access, disclosures, modifications, and destructions of data and system data that use, store, and transmit data. The most important resource that enterprises must protect is information. In an effort to learn how to secure such vital information resources, the relevant business may incur significant losses in terms of money, brand reputation, customers, etc., if sensitive information ends up in the wrong hands. Various statistics, threat forecasts, key terms related to information security, information security components, and the security, functionality, and usability triangle are covered ...