نوشته‌ها

MySQL Connector/Python Revealed

MySQL Connector/Python Revealed

Move data back and forth between database and application. The must-have knowledge in this book helps programmers learn how to use the official driver, MySQL Connector/Python, by which Python programs communicate with the MySQL database. 

This book takes you from the initial installation of the connector through basic query execution, then through more advanced topics, error handing, and troubleshooting. The book covers both the traditional API as well as the new X DevAPI. The X DevAPI is part of MySQL 8.0 and is an API that can be used with connectors for several programming languages and is used from the command-line interface known as MySQL Shell. You will learn to use the connector by working through code examples and following a discussion of how the API calls work. 

By the end of the book, you will be able to use MySQL as the back-end storage for your Python programs, and you’ll even have the option of choosing between SQL and NoSQL interfaces. 

What You’ll Learn

Install MySQL Connector/Python

Connect to MySQL and configure database access

Execute SQL and NoSQL queries from your Python program

Trap errors and troubleshoot problems

Store data from different languages using MySQL’s character set support

Work in the X DevAPI that underlies all of MySQL’s language connectors

Who This Book Is For

Developers familiar with Python who are looking at using MySQL as the back-end database. No prior knowledge of Connector/Python is assumed, but readers should be familiar with databases and the Python programming language. 

 

دانلود رایگان کتاب

Learning Cypher

Learning Cypher

About This Book

Improve performance and robustness when you create, query, and maintain your graph database

Save time by writing powerful queries using pattern matching

Step-by-step instructions and practical examples to help you create a Neo4j graph database using Cypher

Who This Book Is For

If you want to learn how to create, query, and maintain a graph database, or want to migrate to a graph database from SQL, this is the book for you.

What You Will Learn

Design and create flexible and fast graph databases using the Cypher declarative syntax

Write powerful, readable, and reusable queries with pattern matching and parameters

Develop fast applications using best practices to improve the performance of your Cypher queries

Transition smoothly from SQL to Neo4j

Migrate relational databases to the graph model, getting rid of O/R mismatch

Avoid the common mistakes and pitfalls in programming with Neo4j

 

دانلود رایگان کتاب

Hacking For Dummies

Hacking For Dummies

welcome to Hacking For Dummies, 5th Edition

This book outlines in plain English computer hacker tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them This hacking is the professionala boveboard, and legal type of security testing which I often refer to as ethical hacking throughout the book,

سرفصل ها:

Part I: Building the Foundation for Security Testing

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Cracking the Hacker Mindset

Chapter 3: Developing Your Ethical Hacking Plan

Chapter 4: Hacking Methodology

Part II: Putting Security Testing in Motion

Chapter 5: Information Gathering

Chapter 6: Social Engineering

Chapter 7: Physical Security

Chapter 8: Passwords

Part III: Hacking Network Hosts

Chapter 9: Network Infrastructure Systems

Chapter 10: Wireless Networks

Chapter 11: Mobile Devices

Part IV: Hacking Operating Systems

Chapter 12: Windows

Chapter 13: Linux

Part V: Hacking Applications

Chapter 14: Communication and Messaging Systems

Chapter 15: Web Applications and Mobile Apps

Chapter 16: Databases and Storage Systems

Part VI: Security Testing Aftermath

Chapter 17: Reporting Your Results

Chapter 18: Plugging Security Holes

Chapter 19: Managing Security Processes

Part VII: The Part of Tens

Chapter 20: Ten Tips for Getting Security Buy-In

Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test

Chapter 22: Ten Deadly Mistakes

مشخصات:

نویسنده:Kevin Beaver

ناشر:John Wiley & Sons

سال نشر:۲۰۱۷

تعداد صفحات:۴۱۰

 

دانلود رایگان کتاب