Unisciti a noi in un viaggio nel mondo dei libri!
Aggiungi questo libro allo scaffale
Grey
Scrivi un nuovo commento Default profile 50px
Grey
Iscriviti per leggere l'intero libro o leggi le prime pagine gratuitamente!
All characters reduced
A Comprehensive Guide to Java GUI Programming with SQLite - cover

Ci dispiace! L'editore o autore ha rimosso questo libro dal nostro catalogo. Ma per favore non ti preoccupare, hai ancora oltre 500.000 altri libri da scegliere!

A Comprehensive Guide to Java GUI Programming with SQLite

Vivian Siahaan, Rismon Hasiholan Sianipar

Casa editrice: SPARTA PUBLISHING

  • 0
  • 0
  • 0

Sinossi

The lessons in this book are a highly organized and well-indexed set of tutorials meant for students and programmers. Netbeans, a specific IDE (Integrated Development Environment) is used to create GUI (Graphical User Interface applications).The finished product is the reward, but the readers are fully engaged and enriched by the process. This kind of learning is often the focus of training. In this book, you will learn how to build from scratch a SQLite database management system using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. Gradually and step by step, you will be taught how to use SQLite in Java. 
In chapter one, you will learn: How to create SQLite database and six tables In chapter two, you will study: Creating the initial three table projects in the school database: Teacher table, TClass table, and Subject table; Creating database configuration files; Creating a Java GUI for viewing and navigating the contents of each table; Creating a Java GUI for inserting and editing tables; and Creating a Java GUI to join and query the three tables. 
In chapter three, you will learn: Creating the main form to connect all forms; Creating a project will add three more tables to the school database: the Student table, the Parent table, and Tuition table; Creating a Java GUI to view and navigate the contents of each table; Creating a Java GUI for editing, inserting, and deleting records in each table; Creating a Java GUI to join and query the three tables and all six tables. In chapter four, you will study how to query the six tables. 
In chapter five, you will create Bank database and its four tables. In chapter six, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. 
In chapter seven, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. 
In chapter eight, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. 
In chapter nine, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. 
In chapter ten, you will create Crime database and its six tables. In chapter eleven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. 
In chapter twelve, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo.
Disponibile da: 31/01/2020.

Altri libri che potrebbero interessarti

  • Zoo Story - Life in the Garden of Captives - cover

    Zoo Story - Life in the Garden...

    Thomas French

    • 0
    • 0
    • 0
    Welcome to the savage and surprising world of Zoo Story, an unprecedented account of the secret life of a zoo and its inhabitants, both animal and human. Based on six years of research, the book follows a handful of unforgettable characters at Tampa's Lowry Park Zoo: an alpha chimp with a weakness for blondes, a ferocious tiger who revels in Obsession perfume, and a brilliant but tyrannical CEO known as El Diablo Blanco. Zoo Story crackles with issues of global urgency: the shadow of extinction, humanity's role in the destruction or survival of other species. More than anything else, though, it's a dramatic and moving true story of seduction and betrayal, exile and loss, and the limits of freedom on an overcrowded planet-all framed inside one zoo reinventing itself for the twenty-first century. Thomas French, a Pulitzer Prize-winning reporter, chronicles the action with vivid power: Wild elephants soaring above the Atlantic on their way to captivity. Predators circling each other in a lethal mating dance. Primates plotting the overthrow of their king. The sweeping narrative takes the listener from the African savannah to the forests of Panama and deep into the inner workings of a place some describe as a sanctuary and others condemn as a prison. All of it comes to life in the book's four-legged characters. Zoo Story shows us how these remarkable individuals live, how some die, and what their experiences reveal about the human desire to both exalt and control nature.
    Mostra libro
  • ISO IEC 27001:2022 - An introduction to information security and the ISMS standard - cover

    ISO IEC 27001:2022 - An...

    Steve Watkins

    • 0
    • 0
    • 0
    Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 – An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022.
    The guide is a must-have resource giving a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable.
    This pocket guide will help you to:
    
    - Make informed decisionsUsing this guide will enable the key employees in your organisation to make better decisions before embarking on an information security project.
    
    - Ensure everyone is up to speedThis guide will give the non-specialists on the project board and in the project team a clearer understanding of what an information security management system involves, reflecting the ISO 27001:2022 version of the Standard.
    
    - Raise awareness among staffEnsure that your staff know what is at stake with regard to information security and understand what is expected of them with this pocket guide.
    
    - Enhance your competitivenessUse this guide to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately.
    Get up to speed with the ISO 27001:2022 updates and keep your information secure
    About the author:
    Steve is a Director of Kinsnall Consulting Ltd, providing board-level advice on cyber security and related standards.
    Steve is an active member of SC 27, the international committee responsible for cyber security, information security and privacy protection standards, including the ISO 27001 family. He Chairs the UK national committee (IST 33) that mirrors SC 27 and is the Chair of the UK ISO/IEC 27001 User Group.
    He is also a contracted ISMS and ITSMS Technical Assessor for UKAS, supporting the assessment of certification bodies offering accredited certification to ISO/IEC 27001 and ISO/IEC 20000-1.
    TOC:
    Introduction
    Chapter 1: Information security – What's that?
    Chapter 2: It's not IT
    Chapter 3: ISO 27001 and the management system requirements
    Chapter 4: Legal, regulatory and contractual requirements and business risk
    Chapter 5: Information security controls
    Chapter 6: Certification
    Chapter 7: Signposting
    Further reading
    Mostra libro
  • Winter World - The Ingenuity of Animal Survival - cover

    Winter World - The Ingenuity of...

    Bernd Heinrich

    • 0
    • 0
    • 0
    The animal kingdom relies on staggering evolutionary innovations to survive winter. Unlike their human counterparts, who alter the environment to accommodate physical limitations, most animals are adapted to an amazing range of conditions. In Winter World: The Ingenuity of Animal Survival, biologist, illustrator, and award-winning author Bernd Heinrich explores his local woods, where he delights in the seemingly infinite feats of animal inventiveness he discovers there.Because winter drastically affects the most elemental component of all life-water-radical changes in a creature's physiology and behavior must take place to match the demands of the environment. Some creatures survive by developing antifreeze; others must remain in constant motion to maintain their high body temperatures. Even if animals can avoid freezing to death, they must still manage to find food in a time of scarcity or store if from a time of plenty.Infused by the author's inexhaustible enchantment with nature, Winter World awakens the wonders and mysteries by which nature sustains herself through winter's harsh, cruel exigencies.
    Mostra libro
  • Cancer Healing Sleep Hypnosis - Positive Affirmations To Help You Heal Cancer Naturally Self-Hypnosis & Guided Meditation - cover

    Cancer Healing Sleep Hypnosis -...

    Lightheart Hypnosis

    • 0
    • 0
    • 0
    When your mind is relaxed, it allows the body to become into a pure resonance of healing energy. Harmony heals. 
    This sleep hypnosis uses soothing background music and a calm voice to bring you into a coherent state of mind. 
    Listen to these healing affirmations before you go to sleep or while sleeping and reprogram your subconscious mind to start healing 
    your body faster. 
    Heal your mind, heal your body.
    Mostra libro
  • The Book of Cats - cover

    The Book of Cats

    Charles Henry Ross

    • 0
    • 0
    • 0
    One day, ever so long ago, it struck me that I should like to try and write a book about Cats. I mentioned the idea to some of my friends: the first burst out laughing at the end of my opening sentence, so I refrained from entering into further details. The second said there were a hundred books about Cats already. The third said, “Nobody would read it,” and added, “Besides, what do you know of the subject?” and before I had time to begin to tell him, said he expected it was very little. “Why not Dogs?” asked one friend of mine, hitting upon the notion as though by inspiration. “Or Horses,” said some one else; “or Pigs; or, look here, this is the finest notion of all:— 
    ‘THE BOOK OF DONKIES,BY ONE OF THE FAMILY!’”Somewhat disheartened by the reception my little project had met with, I gave up the idea for awhile, and went to work upon other things. I cannot exactly remember what I did, or how much, but my book about Cats was postponed sine die, and in the meantime I made some inquiries.I hope I have not been very prosy, and I hope, in the somewhat large collection of Cat anecdotes here brought together, “the only one worth the trouble of relating” has not been omitted. If this has been the case, allow me to assure you it has not been because I have spared any trouble in gathering together my materials. (C.H.Ross)
    Mostra libro
  • AI for beginners - Begin your AI developer journey in 2024 - cover

    AI for beginners - Begin your AI...

    Et Tu Code

    • 0
    • 0
    • 0
    Are you intrigued by artificial intelligence (AI) and eager to delve into its realm? Look no further! This guide is tailored to beginners, offering a comprehensive introduction to AI in 2024. 
    Section 1: Introduction to AI 
    Learn about AI basics like machine learning, deep learning, and neural networks and their transformative impact on industries. 
    Section 2: AI Fundamentals 
    Delve into AI principles such as supervised/unsupervised learning, reinforcement learning, and model types and applications. 
    Section 3: AI Tools and Frameworks 
    Discover popular tools like TensorFlow, PyTorch, and Keras for building and training AI models. 
    Section 4: Practical AI Applications 
    Explore AI's real-world uses in healthcare, finance, marketing, and more for problem-solving and decision-making. 
    Section 5: Building Your First AI Project 
    Step through creating your initial AI project, covering data preprocessing, model training, and evaluation. 
    Section 6: AI in 2024 and Beyond 
    Stay updated on AI advancements like Generative AI, Large Language Models (LLMs), OpenAI, and Llama 2. 
    Section 7: Generative AI 
    Learn about Generative AI's ability to create realistic content in entertainment, advertising, and healthcare. 
    Section 8: Large Language Models (LLMs) 
    Explore LLMs like BERT, RoBERTa, and XLNet, revolutionizing natural language processing. 
    Section 9: OpenAI 
    Understand OpenAI's impact on AI research, robotics, and its commitment to ethical AI development. 
    Section 10: Llama 2 - Meta AI 
    Discover Llama 2's advancements and potential applications across industries. 
    Section 11: Hugging Face AI Community 
    Engage with Hugging Face's vibrant AI community for resources, tutorials, and updates on AI developments.
    Mostra libro