TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Integrity
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Ayush Gupta (4)
Vijay Yadav (3)
Jitendra Mesavaniya (3)
Lalit Bansal (2)
Nikunj Satasiya (2)
Mohamed Azarudeen Z (2)
Rohini Parade (2)
Jaimin Shethiya (2)
Ishika Tiwari (2)
Allen Oneill (1)
Deepak Middha (1)
Onkar Sharma (1)
Harminder Singh (1)
Shikha Tiwari (1)
Tural Suleymani (1)
Vipul Kumar (1)
Naveen Kumar (1)
Priyanshu Agnihotri (1)
Chetan Sanghani (1)
Sanjay Kumar (1)
Shubhankar Banerjee (1)
Henry He (1)
Prakashkumar Sahoo (1)
Kunal Patil (1)
Rajkiran Swain (1)
Mariusz Postol (1)
Habibul Rehman (1)
Shiv Sharma (1)
Kuppu Swami (1)
Muzaffar Ur Rahman (1)
Shaishav Desai (1)
C# Curator (1)
Alpesh Maniya (1)
Jin Necesario (1)
Vipin Mittal (1)
Rohatash Kumar (1)
Ramesh Kartik (1)
Arvind Kataria (1)
David Talbot (1)
Gowri S Paramasivam (1)
John Charles Olamendy (1)
Syed Shakeer (1)
Vijai Anand Ramalingam (1)
Destin Joy (1)
Related resources for Integrity
No resource found
Exploring the Role of KMS in Cloud Security and Encryption
11/25/2024 5:46:23 AM.
Key Management Systems (KMS) play a critical role in cloud security by managing encryption keys for data protection. KMS ensures secure cloud storage, prevents unauthorized access, and facilitates com
Data Quality, Security, and Building Trust in AI
11/15/2024 5:14:14 AM.
As AI adoption grows, data quality, security, privacy, and trust are becoming critical. Organizations must prioritize data cleansing, validation, encryption, and access controls to ensure reliable AI
Check Constraint in SQL Server 2012
10/16/2024 9:55:46 AM.
A Check Constraint in SQL Server enforces Domain Integrity by ensuring valid values for specific table columns. It restricts invalid data entries, rejects values that don't meet set conditions, an
How To Delete Duplicate Rows From A Table In SQL Server
10/12/2024 5:29:23 AM.
This guide explains how to delete duplicate rows from a table in SQL Server. Using common techniques like ROW_NUMBER() with PARTITION BY, you can identify and remove duplicate rows while keeping the o
Types of Keys in SQL
10/1/2024 6:09:16 AM.
In SQL, keys play a crucial role in maintaining data integrity and defining relationships between tables. Common types include the Primary Key, which uniquely identifies records; the Foreign Key, link
The Intersection of Blockchain and AI: A New Era of Decentralized Intelligence
9/6/2024 10:50:12 AM.
The integration of blockchain and AI is revolutionizing technology by enhancing security, transparency, and efficiency. Blockchain ensures data integrity and accountability, while AI optimizes decisio
File Structure: Writing and Reading Records Efficiently
8/29/2024 8:59:42 AM.
In C programming, fwrite() and fread() manage data storage and retrieval. fwrite() writes structures to a binary file, while fread() reads them back. This involves defining a structure, opening a file
Resolving Race Conditions and Critical Sections in C#
8/28/2024 9:49:18 AM.
A race condition in C# occurs when multiple threads access shared data simultaneously without proper synchronization, leading to unpredictable and incorrect results. This tutorial covers how to identi
Difference between lock(this) and lock(privateObj) in C#
8/22/2024 5:27:38 AM.
In multi-threaded C# programming, the lock statement ensures that critical code sections are accessed by only one thread at a time. While lock(this) locks on the current instance, it can expose your o
Difference Between Primary Key and Unique Key in SQL
8/12/2024 9:38:24 AM.
Primary Key and Unique Key are essential in relational databases for data integrity. A Primary Key uniquely identifies each row and cannot be NULL, while a Unique Key ensures column values are unique
T-SQL Script for Purging Tables with Foreign Key References
8/2/2024 8:42:15 AM.
This article provides a comprehensive T-SQL script for purging tables in SQL Server, including those with foreign key references, ensuring data integrity and correct order of operations. Ideal for SQL
Creating Maintaining Utilizing Transactions in SQL Server
7/25/2024 5:25:28 AM.
A transaction in SQL Server is a sequence of operations performed as a single logical unit of work. A transaction has four main properties, often referred to by the acronym ACID: Atomicity, Consistenc
Understanding TLS and SSL: Securing Your Digital Communications
7/24/2024 9:31:22 AM.
TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are cryptographic protocols designed to secure data transmitted over the internet by encrypting and authenticating the com
Understanding Normalization in SQL
7/24/2024 4:47:41 AM.
Normalization is a database design process that reduces redundancy and improves data integrity by organizing data into tables and defining relationships. It involves applying normal forms (1NF, 2NF, 3
Creating Triggers in SQL Server
7/24/2024 4:44:18 AM.
SQL Server triggers are automated procedures that execute in response to specific events, enhancing data integrity and enforcing business rules. They include DML triggers (AFTER, INSTEAD OF) for data
Encrypting Header & Request Body Parameters in .NET Core Web API
7/24/2024 4:14:10 AM.
In this article, we'll explore how to encrypt header and request body parameters in a .NET Core Web API to prevent them from being readable in the page source or by network sniffing tools. We'
Transactions in ADO.NET: Ensuring Data Integrity
7/23/2024 8:18:17 AM.
In database management, transactions are essential to ensure data integrity and consistency. A transaction is a sequence of operations performed as a single logical unit of work
After Business Rules in ServiceNow: Scenarios and Best Practices
7/22/2024 3:49:40 AM.
After Business Rules in ServiceNow execute after a database operation, enabling actions that depend on the successful completion of the initial operation. Common scenarios include audit logging, trigg
Inner Workings of a Query Processor
7/18/2024 9:34:43 AM.
The query processor in a DBMS is pivotal, handling DML and DDL queries through stages like compilation, linking, and optimization. It ensures efficient execution, supporting operations like SELECT, IN
Before Business Rules in ServiceNow: Scenarios, Scripts, and Best Practices
7/12/2024 7:04:10 AM.
Learn about ServiceNow business rules and their importance in data validation and integrity. Explore real-time use cases like incident priority determination, preventing unauthorized modifications, dy
Prefer Static HashData Method over ComputeHash in C# .NET
7/8/2024 12:20:33 PM.
In .NET, the HashData method offers a modern, efficient way to perform hashing operations, eliminating the need for instantiating hashing algorithm classes like SHA256. It simplifies code, enhances pe
Benefits of Locking and Unlocking Objects in C#
7/3/2024 11:06:28 AM.
Object locking in C# ensures controlled access to shared resources in multithreaded environments, preventing race conditions and maintaining data integrity. By using the lock statement, you can synchr
The Role of Nonces in Ethereum and EVM Transactions
6/19/2024 9:33:55 AM.
Explore the role of nonces in EVM-based blockchains like Ethereum. Learn how nonces ensure transaction security, prevent double-spending, and maintain blockchain integrity.
Backing Up and Restoring a SQL Database
6/19/2024 7:31:50 AM.
In database management, ensuring data integrity and availability is paramount. Regularly backing up your database is crucial to mitigate risks such as hardware failures, software issues, or accidental
Building A Blockchain In .NET Core - Basic Blockchain
6/6/2024 11:46:24 AM.
Blockchain technology is the foundation of the Bitcoin. With the popular of Bitcoin, Blockchain gets popular too. People start to use Blockchain other than cryptocurrency in all kinds of applications.
Understanding Azure Cosmos DB Consistency Levels Using a Shopping Cart Application
6/1/2024 8:52:03 AM.
Explore Azure Cosmos DB's consistency levels through a shopping cart application to understand how different settings impact data integrity, availability, and latency. Learn the trade-offs between
Identifying Missing Sequence Numbers in SQL
5/31/2024 9:45:12 AM.
In this article, we explore a method to identify missing sequence numbers in a database table using SQL. SQL code utilizes window functions and CTEs to efficiently find gaps in the sequence of region
Unique ID Generator Xid.NET in .NET Core
5/31/2024 6:22:31 AM.
A globally unique ID generator library called Xid.Net is prepared for safe and direct usage in your code. It offers an interface akin to that of the System.Guid produces lesser ids (12 bytes compared
Understanding ACID: The Foundation of Database Transactions
5/17/2024 6:27:51 AM.
In the domain of database management, ACID (Atomicity, Consistency, Isolation, Durability) principles assure transaction reliability. This article delves into ACID's history, necessity, evolution,
Primary Key in SQL: Syntax, Usages, and Example
5/14/2024 11:46:09 AM.
A primary key in SQL uniquely identifies each record in a database table. It ensures data integrity and efficient data retrieval. Defined using the CREATE TABLE or ALTER TABLE commands, a primary key
SQL Locks for Data Integrity in Concurrent Environments
5/14/2024 8:24:44 AM.
Understanding SQL Locks: Ensuring Data Integrity in Concurrent Environments
SQL Concurrency: Maintaining Data Integrity in Concurrent Environments
5/14/2024 7:07:02 AM.
Concurrency in databases enables multiple users or processes to access and modify data concurrently, enhancing performance. SQL concurrency ensures data consistency and integrity through locking mecha
Checksum Using the Verhoeff Algorithm
5/8/2024 6:10:46 AM.
In this article we will see how we can calculate Checksum Using the Verhoeff algorithm. This article introduces the Verhoeff algorithm, a method for ensuring data integrity, particularly in sensitive
What is Damm Algorithm with Example
4/25/2024 4:22:38 AM.
The Damm Algorithm is a checksum method designed to detect errors in data entry or transmission, particularly in numerical sequences.
Understanding the Layers of Database Management Systems
4/21/2024 2:29:09 PM.
Unlocking the Power of Three-Tier Architecture: A Comprehensive Guide to Understanding and Implementing Database Management Systems. Dive deep into the layers of presentation, application, and data ma
Implementation of Base64 Encryption/Decryption in Power App
4/5/2024 7:12:00 AM.
Base64 is a method for encoding binary data into text, ensuring data integrity during transmission. Implemented in Power Apps using Power Fx, it's vital for tasks like email (MIME), XML, or JSON d
What is Record Keyword/Function in C#?
4/3/2024 10:37:44 AM.
Records introduced in C# 9.0 represent a significant enhancement to the language's capability for handling data. This article aims to explore records in-depth, covering their syntax, features, and
Validation Settings In SharePoint
2/21/2024 10:57:09 AM.
Validation Settings in SharePoint 2013 enable users to enforce data integrity and quality in lists and libraries. Through custom validation formulas, JavaScript, or built-in functions, users can defin
Cybersecurity of External Streaming Data - Integrity
2/14/2024 4:04:35 AM.
This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity of b
Secure Facebook Webhook Payloads in ASP.NET Core 8 with HMAC256 Verification
2/8/2024 8:15:07 AM.
In the realm of web development, integrating with platforms like Meta Facebook is common. This article guides us through verifying Facebook webhook payload signatures in ASP.NET Core 8, which is cruci
Understanding Document Library in SharePoint
1/12/2024 6:05:36 AM.
In this article, we will learn about the full potential of SharePoint libraries with this in-depth guide. Explore document management, customization, integration, and security features, empowering org
Understanding the One-Way Nature of HASHBYTES in SQL
1/5/2024 10:48:17 AM.
This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
How to Create Login page in PowerApps using SharePoint
12/27/2023 6:58:21 AM.
PowerApps with a secure login screen. Learn the step-by-step process, from designing the interface to connecting to data sources, validating user credentials, handling navigation, and ensuring applica
Protecting Data Integrity and Privacy in Testing
9/1/2023 9:30:31 AM.
Data Integrity and Privacy in Testing: Essential for Reliability and Compliance. Explore the significance, best practices, and a real-time example of safeguarding sensitive data during testing.
What Is The Difference Between Relational And Non-Relational Database
7/27/2023 10:15:20 AM.
Relational databases and non-relational databases, also known as NoSQL databases, represent two fundamentally different approaches to storing and organizing data. Understanding the key differences bet
Filtering Data with Global Query Filters in Entity Framework
5/24/2023 10:27:50 AM.
In certain cases, you may need to apply filtering conditions to all queries involving specific entities. This can be useful when you want to exclude soft-deleted items, filter data based on certain cr
SQL Server Primary Keys
3/6/2023 6:41:21 AM.
Discusses what's a primary key, entity integrity, primary key constraint, composite keys, and the benefits of a primary key.
Capture And Store SQL Server Database Integrity History Using DBCC CHECKDB
2/24/2023 6:34:56 AM.
To capture and store the SQL Server database integrity history using DBCC CHECKDB.
Cascading Referential Integrity Constraint in SQL Server
1/17/2023 9:34:22 AM.
This article will give you an idea of how to use SQL Cascading Constraint and also defines the situations where you can use it.
Basics Of WCF Security
9/26/2019 3:33:49 AM.
This article is all about the basics of the WCF Security; in other words, this is the starting point of diving into the WCF Security concepts.
SQL Server Foreign Key Update And Delete (Cascading Referential Integrity)
7/31/2019 9:15:54 AM.
In this article, you will learn about SQL Server Foreign Key Delete (Cascading Referential Integrity).
Data Integrity in Web Services
10/13/2012 5:46:52 AM.
Web Services bring with them great possibilities and with these possibilities are some pitfalls.
Cryptography in Microsoft.NET Part I: Encryption
10/3/2012 9:41:46 AM.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
Backup and Recovery in Database Systems
5/20/2012 4:48:20 AM.
This article is intended to cover one of the most critical responsibilities of database administrators in order to maintain data integrity.
CASCADING Referential Integrity in SqlServer
5/13/2012 6:28:25 AM.
This article will explain how to delete and update Child Table records implicitly when updating or deleting a Parent Table.
Referential Integrity in SharePoint 2010
3/31/2011 6:01:04 AM.
In this article we will be seeing a new feature called Referential Integrity in SharePoint 2010.
Referential Integrity in SharePoint 2010
10/26/2010 5:54:03 AM.
In this article I am showing you a new feature in SharePoint 2010 called referential integrity.