Skip to content
Adglob Infosystem Pvt Ltd
  • About Us
  • B2B and B2C Database
  • Bulk Email Solution
  • Contact Us
  • Corporate Email Service
  • Database Portfolio
  • Database Process Flow
  • Database Services
  • FAQs
  • Lead Generation
  • Managed Email Campaign Solution
  • Our Clients
  • Privacy Policy
  • Product Blog
  • Request Sample for Free Database
  • Terms & Conditions
  • Web Scrapping
  • Author: K Z

    This author has written 1821 articles
    1. Home>
    2. K Z>
    3. Page 55

    Python – Numpy

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Python - Data Science
    • Post comments:0 Comments

    NumPy is a Python package which stands for 'Numerical Python'. It is a library consisting of multidimensional array objects and a collection of routines for processing of array. Operations using…

    Continue ReadingPython – Numpy

    Python – Pandas

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Python - Data Science
    • Post comments:2 Comments

    Pandas is an open-source Python Library used for high-performance data manipulation and data analysis using its powerful data structures. Python with pandas is in use in a variety of academic…

    Continue ReadingPython – Pandas

    Python – Data Science Environment Setup

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Python - Data Science
    • Post comments:0 Comments

    To successfully create and run the example code in this tutorial we will need a Data Science environment set up which will have both general-purpose Python as well as the…

    Continue ReadingPython – Data Science Environment Setup

    Python – Data Science

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Python - Data Science
    • Post comments:0 Comments

    Data science is the process of deriving knowledge and insights from a huge and diverse set of data through organizing, processing and analysing the data. It involves many different disciplines…

    Continue ReadingPython – Data Science

    Cryptography Benefits & Drawbacks

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Cryptography
    • Post comments:0 Comments

    In this section, we will discuss the Benefits & Drawbacks of Cryptography. Nowadays, the networks have gone global and information has taken the digital form of bits and bytes. Critical…

    Continue ReadingCryptography Benefits & Drawbacks

    Public Key Infrastructure

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Cryptography
    • Post comments:1 Comment

    The most distinct feature of Public Key Infrastructure (PKI) is that it uses a pair of keys to achieve the underlying security service. The key pair comprises of private key…

    Continue ReadingPublic Key Infrastructure

    Cryptography Digital signatures

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Cryptography
    • Post comments:1 Comment

    Digital signatures are the public-key primitives of message authentication. In the physical world, it is common to use handwritten signatures on handwritten or typed messages. They are used to bind…

    Continue ReadingCryptography Digital signatures

    Message Authentication

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Cryptography
    • Post comments:4 Comments

    In the last chapter, we discussed the data integrity threats and the use of hashing technique to detect if any modification attacks have taken place on the data. Another type…

    Continue ReadingMessage Authentication

    Cryptography Hash functions

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Cryptography
    • Post comments:1 Comment

    Hash functions are extremely useful and appear in almost all information security applications. A hash function is a mathematical function that converts a numerical input value into another compressed numerical…

    Continue ReadingCryptography Hash functions

    Data Integrity in Cryptography

    • Post author:K Z
    • Post published:October 29, 2021
    • Post category:Cryptography
    • Post comments:0 Comments

    Until now, we discussed the use of symmetric and public key schemes to achieve the confidentiality of information. With this chapter, we begin our discussion on different Data Integrity cryptographic…

    Continue ReadingData Integrity in Cryptography
    • Go to the previous page
    • 1
    • …
    • 52
    • 53
    • 54
    • 55
    • 56
    • 57
    • 58
    • …
    • 183
    • Go to the next page
    Copyright - OceanWP Theme by OceanWP