EAT SLEEP CODE REPEAT

  • Information Security Principles and Practices Merkow PDF

    Introduction “Begin a t the beginning, ” the King said, very gravely, “and go on till you come to the end: then stop.” — Lewis Carroll, Alice in Wonderland

  • Longest Valid Parentheses – Leetcode Python

    Given a string containing just the characters ‘(‘ and ‘)’, find the length of the longest valid (well-formed) parentheses substring. Examples Input: s = “(()” Output: 2 Explanation: The longest valid parentheses substring is “()”.

  • Longest Palindromic Substring Solution – Python LeetCode

    The goal is to create all palindromes of even and odd lengths while keeping track of the longest palindrome seen so far. To make a palindrome with an odd length, For lengthier palindromes, fix a centre and expand in both directions, i.e. fix I (index) as the centre and two indices as i1 = i+1 and i2 = i-1. If i1 and i2 are equal, reduce i2 and raise i1 to get the maximum length.

  • 3sum Closest Leetcode Solution – Leetcode Python

    Given an integer array nums, return all the triplets [nums[i], nums[j], nums[k]] such that i != j, i != k, and j != k, and nums[i] + nums[j] + nums[k] == 0.

  • Next Permutation Leetcode – Python Solution

    A permutation of an array of integers is an arrangement of its members into a sequence or linear order.

  • Database System Concepts 7th Edition Solutions -Chapter 2

    Database System Concepts is the highly recommended book for the people interested in databases. Free version of this book can be downloaded from HERE. Practice Exercises 2.1 Consider the employee database in below Figure. What are the appropriate primary keys? Primary key is an attribute in a table which can uniquely identify that table. In employee […]

  • Interval Partitioning

    When data put into a table surpasses all of the existing range partitions. Interval partitioning is an extension of range partitioning that directs the database to automatically build segments of a defined interval. At least one range division must be specified. For Definition and more visit HERE Example There are 10 Lectures, each with a fixed […]

  • Five Essential Characteristics of Cloud Computing defined by NIST

    The Simple Definition of Cloud Computing is Delievery of On-demand Computing Resources. The Five Essential Characteristics of Cloud Computing defined by NIST are On-Demand Self-service, Broad Network Access, Resource Pooling, Rapid Elasticity and Measured Resources. Cloud Computing defined by NIST A model for enabling Convienient, on-demand network access to shared pool of configurable computing resources that can […]

  • Optimal Caching – Greedy Algorithm

    Optimal Caching is a technique that reduces the number of cache misses compared to any other method of cache management.

  • Accountability in Network Security

    Accountability in Network Security

    Do you know what Accountability in Network Security is? It is a logging and audit trail. The idea is that someone is responsible for maintaining the security and control of tools, materials, and data and is liable to the appropriate authorities in case any of those items is lost or misused.