Tutorial by Examples: s

Security policy is a group of predicates associated to tables that can be managed together. You can add, or remove predicates or turn on/off entire policy. You can add more predicates on tables in the existing security policy. ALTER SECURITY POLICY dbo.CompanyAccessPolicy ADD FILTER PREDICATE...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
The point about temporary tables is that they're limited to the scope of the connection. Dapper will automatically open and close a connection if it's not already opened. That means that any temp table will be lost directly after creating it, if the connection passed to Dapper has not been opened. ...
Automatic calculation of low and high thresholds for the Canny operation in opencv
Access the RecyclerView in the NavigationView and add ItemDecoration to it. NavigationView navigationView = (NavigationView) findViewById(R.id.nav_view); NavigationMenuView navMenuView = (NavigationMenuView) navigationView.getChildAt(0); navMenuView.addItemDecoration(new DividerItemDecoration(thi...
Install from NPM. npm install sails-mongo --save
Create a new SSDT project Import 3rd party DB Build project to create a dacpac Reference dacpac in other projects
C++ provides only 4 anchors: ^ which asserts the start of the string $ which asserts the end of the string \b which asserts a \W character or the beginning or end of the string \B which asserts a \w character Let's say for example we want to capture a number with it's sign: auto input = &q...
Google Apps Script is a JavaScript based platform-as-a-service primarily used to automate and extend Google Apps. Apps Script runs exclusively on Google's infrastructure requiring no server provisioning or configuration. An online IDE serves as the interface to the entire platform connecting all the...
Detailed instructions on getting mips set up or installed.
We need two dependencies: bcrypt for encryption npm install bcrypt --save JSON Web token npm install jsonwebtoken --save
Go to the repository you want to clone (something like: https://github.com/username/repo) On the right, click on the green button named clone or download A small window will appear, copy the url (something like: https://github.com/username/repo.git) Open a terminal window on...
If you have email column you can mask it with email() mask: ALTER TABLE Company ALTER COLUMN Email ADD MASKED WITH (FUNCTION = 'email()') When user tries to select emails from Company table, he will get something like the following values: [email protected] [email protected] [email protected]
You can add partial mask on the column that will show few characters from te beginning and the end of the string and show mask instead of the characters in the middle: ALTER TABLE Company ALTER COLUMN Phone ADD MASKED WITH (FUNCTION = 'partial(5,"XXXXXXX",2)') In the parameters of th...
Random mask will show a rundom number from the specified range instead of the actual value: ALTER TABLE Product ALTER COLUMN Price ADD MASKED WITH (FUNCTION = 'random(100,200)') Note that is some cases displayed value might match actual value in column (if randomly selected number matches valu...
If you add default mask on the column, instead of actual value in SELECT statement will be shown mask: ALTER TABLE Company ALTER COLUMN Postcode ADD MASKED WITH (FUNCTION = 'default()')
You can grant in-privileged users right to see unmasked values using the following statement: GRANT UNMASK TO MyUser If some user already has unmask permission, you can revoke this permission: REVOKE UNMASK TO MyUser
download QtSpim from here 32.6 MB install it easy installation make your first assembly file (.s) or use the sample C:\Program Files (x86)\QtSpim\helloworld.s run the program from the desktop shortcut or C:\Program Files (x86)\QtSpim\QtSpim.exe there are two windows for the program the main ...
Password Based Key Derivation can be used both for deriving an encryption key from password text and saving a password for authentication purposes. There are several hash algorithms that can be used including SHA1, SHA256, SHA512 which are provided by this example code. The rounds parameter is use...
See Swift 3 example for usage information and notes func pbkdf2SHA1(password: String, salt: [UInt8], keyCount: Int, rounds: Int) -> [UInt8]? { return pbkdf2(CCPBKDFAlgorithm(kCCPRFHmacAlgSHA1), password:password, salt:salt, keyCount:keyCount, rounds:UInt32(rounds)) } func pbkdf2SHA256(p...

Page 747 of 1057