The Complete Guide to DBASE Mac
Author : Dan Shafer
Publisher : Pearson Scott Foresman
Page : 468 pages
File Size : 37,16 MB
Release : 1988
Category : Data base management
ISBN :
Author : Dan Shafer
Publisher : Pearson Scott Foresman
Page : 468 pages
File Size : 37,16 MB
Release : 1988
Category : Data base management
ISBN :
Author : Craig Mullins
Publisher : Addison-Wesley Professional
Page : 736 pages
File Size : 33,69 MB
Release : 2002
Category : Computers
ISBN : 9780201741292
Giving comprehensive, soup-to-nuts coverage of database administration, this guide is written from a platform-independent viewpoint, emphasizing best practices.
Author : Edward Jones
Publisher : Prentice Hall
Page : 328 pages
File Size : 43,51 MB
Release : 1988
Category : Database management
ISBN :
Author : Vivian Siahaan
Publisher : SPARTA Publishing
Page : 215 pages
File Size : 23,18 MB
Release : 2019-01-15
Category : Computers
ISBN :
Python has various database drivers for PostgreSQL. Currently, the psycopg is the most popular PostgreSQL database adapter for the Python language. The psycopg fully implements the Python DB-API 2.0 specification. The current version of the psycopg is 2 or psycopg2. The psycopg2 database adapter implemented in C as a libpq wrapper resulting in both fast and secure. The psycopg2 provides many useful features such as client-side and server-side cursors, asynchronous notification and communication, COPY command support, etc. PostgreSQL was designed to run on UNIX-like platforms. However, PostgreSQL was then also designed to be portable so that it could run on various platforms such as Mac OS X, Solaris, and Windows. PostgreSQL is free and open source software. Its source code is available under PostgreSQL license, a liberal open source license. You are free to use, modify and distribute PostgreSQL in any form. PostgreSQL requires very minimum maintained efforts because of its stability. Therefore, if you develop applications based on PostgreSQL, the total cost of ownership is low in comparison with other database management systems. In Chapter 2, you will learn querying data from the postgresql using Python including establishing a database connection, creating a statement object, executing the query, processing the resultset object, querying data using a statement that returns multiple rows, querying data using a statement that has parameters, inserting data into a table using Python, updating data in postgresql database using Python, calling postgresql stored function using Python, deleting data from a postgresql table using Python, and postgresql Python transaction. In Chapter 3, you will learn managing table structure and views including postgresql data types, postgresql create table, postgresql select into statement, postgresql create table as, using postgresql serial to create auto-increment column, identity column, alter table, drop table, truncate table, check constraint, not-null constraint, foreign key, primary key, unique constraint, managing postgresql views, creating updatable views, materialized views, creating updatable views using the with check option clause, and recursive view. In Chapter 4, you will learn statements, operators, and clauses including select, order by, select distinct, limit, fetch, in, between, postgresql like, is null, alias, joins, inner join, postgresql left join, self-join, full outer join, cross join, natural join, group by, having, intersect operator, except operator, grouping sets, cube, and rollup. In Chapter 5, you will learn postgresql trigger, aggregate, and string functions including creating the first trigger in postgresql, managing postgresql trigger, aggregate functions, avg function, max function, min function, sum function, postgresql concat function, ascii function, trim function, length function, substring function, regexp_matches function, regexp_replace function, replace function, to_number function, and to_char function.
Author : Rusel DeMaria
Publisher : Brady Publishing
Page : 710 pages
File Size : 38,39 MB
Release : 1988
Category : Computers
ISBN :
Author : Vivian Siahaan
Publisher : SPARTA PUBLISHING
Page : 441 pages
File Size : 26,57 MB
Release : 2019-11-28
Category : Computers
ISBN :
This step-by-step guide to explore database programming using Java is ideal for people with little or no programming experience. The goal of this concise book is not just to teach you Java, but to help you think like a programmer. Each brief chapter covers the material for one week of a college course to help you practice what you've learned. As you would expect, this book shows how to build from scratch two different databases: MariaDB and SQLite using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. In the first chapter, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. In the second chapter, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. In the third chapter, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. In the fourth chapter, You create a table with the name of the Account, which has ten columns: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In the fifth chapter, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. In chapter six, you will be shown how to create SQLite database and tables with Java. In chapter seven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. Digital image techniques to extract image features used in this chapted are grascaling, sharpening, invertering, blurring, dilation, erosion, closing, opening, vertical prewitt, horizontal prewitt, Laplacian, horizontal sobel, and vertical sobel. For readers, you can develop it to store other advanced image features based on descriptors such as SIFT and others for developing descriptor based matching. In chapter eight, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo. In chapter nine, you will be taught to create Java GUI to view, edit, insert, and delete Feature_Extraction table data. This table has eight columns: feature_id (primary key), suspect_id (foreign key), feature1, feature2, feature3, feature4, feature5, and feature6. All six fields (except keys) will have a BLOB data type, so that the image of the feature will be directly saved into this table. In chapter ten, you will add two tables: Police_Station and Investigator. These two tables will later be joined to Suspect table through another table, File_Case, which will be built in the seventh chapter. The Police_Station has six columns: police_station_id (primary key), location, city, province, telephone, and photo. The Investigator has eight columns: investigator_id (primary key), investigator_name, rank, birth_date, gender, address, telephone, and photo. Here, you will design a Java GUI to display, edit, fill, and delete data in both tables. In chapter eleven, you will add two tables: Victim and Case_File. The File_Case table will connect four other tables: Suspect, Police_Station, Investigator and Victim. The Victim table has nine columns: victim_id (primary key), victim_name, crime_type, birth_date, crime_date, gender, address, telephone, and photo. The Case_File has seven columns: case_file_id (primary key), suspect_id (foreign key), police_station_id (foreign key), investigator_id (foreign key), victim_id (foreign key), status, and description. Here, you will also design a Java GUI to display, edit, fill, and delete data in both tables. Finally, this book is hopefully useful and can improve database programming skills for every Java/MariaDB/SQLite pogrammer.
Author : Richard Loggins
Publisher : Random House Puzzles & Games
Page : 500 pages
File Size : 42,55 MB
Release : 1988
Category : Computers
ISBN :
Author :
Publisher :
Page : 708 pages
File Size : 37,67 MB
Release : 1989
Category : Macintosh (Computer)
ISBN :
Author :
Publisher :
Page : 1278 pages
File Size : 32,81 MB
Release : 1992
Category : Microcomputers
ISBN :
Author :
Publisher :
Page : 1226 pages
File Size : 15,85 MB
Release : 1989-04
Category : Electronic journals
ISBN :