Join us on a literary world trip!
Add this book to bookshelf
Grey
Write a new comment Default profile 50px
Grey
Subscribe to read the full book or read the first pages for free!
All characters reduced
Building Three Java Gui Applications Using Mysql Mariadb And Postgresql - cover

We are sorry! The publisher (or author) gave us the instruction to take down this book from our catalog. But please don't worry, you still have more than 500,000 other books you can enjoy!

Building Three Java Gui Applications Using Mysql Mariadb And Postgresql

Vivian Siahaan, Rismon Hasiholan Sianipar

Publisher: SPARTA PUBLISHING

  • 0
  • 0
  • 0

Summary

In this book, you will create three Java GUI applications using MySQL, MariaDB, and PostgreSQL. In this book, you will learn how to build from scratch a database management system using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. Gradually and step by step, you will be taught how to utilize three different databases in Java. 
In chapter one, you will create School database and its six tables. In chapter two, you will study: Creating the initial three table projects in the school database: Teacher table, TClass table, and Subject table; Creating database configuration files; Creating a Java GUI for viewing and navigating the contents of each table; Creating a Java GUI for inserting and editing tables; and Creating a Java GUI to join and query the three tables. 
In chapter three, you will learn: Creating the main form to connect all forms; Creating a project will add three more tables to the school database: the Student table, the Parent table, and Tuition table; Creating a Java GUI to view and navigate the contents of each table; Creating a Java GUI for editing, inserting, and deleting records in each table; Creating a Java GUI to join and query the three tables and all six. 
In chapter four, you will study how to query the six tables. 
In chapter five, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. In chapter six, you will create Bank database and its tables. 
In chapter seven, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. 
In chapter eight, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. 
In chapter nine, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. 
In chapter ten, you will be taught how to create Crime database and its tables. In chapter eleven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. 
In chapter twelve, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo.
Available since: 11/20/2019.

Other books that might interest you

  • Survival Mom - How to Prepare Your Family for Everyday Disasters and Worst-Case Scenarios - cover

    Survival Mom - How to Prepare...

    Lisa Bedford

    • 0
    • 0
    • 0
    From the creator of TheSurvivalMom.com comes this first-of-its-kind guidebook for all the “prepper” moms keen to increase their family's level of preparedness for emergencies and crises of all shapes and sizes. Publisher’s Weekly calls Lisa Bedford’s Survival Mom an “impressively comprehensive manual,” saying, “suburban mom Bedford helps readers learn about, prepare for, and respond to all manner of disasters. . . . From 'Instant Survival Tip' sidebars to a list of 'Lessons from the Great Depression'. . . Bedford's matter-of-fact yet supportive tone will keep the willies at bay.”
    Show book
  • Cyber Mayday and the Day After - A Leader's Guide to Preparing Managing and Recovering from Inevitable Business Disruptions - cover

    Cyber Mayday and the Day After -...

    Daniel Lohrmann, Shamane Tan

    • 0
    • 0
    • 0
    Digital transformation and cyber insecurity are two global trends that converged in 2020. The COVID-19 pandemic has accelerated these global challenges into paradigm-changing realities that threaten to destroy every company, government, network, and individual. But what can be done to embrace the accelerating digital disruption and at the same time manage the explosion of vulnerabilities, cyber threats, and business risks? What strategies are enabling technology leaders to thrive in this fast-changing landscape and stay calm in the midst of a world filled with ransomware, online deception, and nation-state hackers?Cyber Mayday and the Day After is a business book, a communication toolkit offering stories, strategies, tactics, and outlook with key extracts and lessons learned from top C-executive leaders around the world. Some of these insights come from former FBIs, NASA agents, government CISOs, and high-profile CxOs, offering practical examples and workable solutions for leaders to succeed in the twenty-first century. This book unpacks key learnings on leadership and influence. It equips listeners with the mastery of their stakeholders and explores how to effect a cultural change within organizations.
    Show book
  • Running The Show - Television from the Inside - cover

    Running The Show - Television...

    Jeff Melvoin

    • 0
    • 0
    • 0
    "Running the Show takes you inside building a show from the ground up and what a showrunner's life looks like in Hollywood. This unique job covers aspects from the creative to the managerial and everything in between. Seasoned showrunner Jeffrey Melvoin shares his fascinating insider's perspective on how to call the shots and make the final decisions when choosing and writing scripts, hiring staff, casting, making the budget, and juggling schedules. Along with the managerial responsibilities that keep the show afloat, they are also the visionary for the series and the characters. Melvoin describes how to confidently communicate abstract ideas so they can become the show's reality. Running the Show reveals the ethical side of show running and writing with humor, integrity, and wisdom. "
    Show book
  • Data Visualization Guide - Clear Guide to Data Science and Visualization - cover

    Data Visualization Guide - Clear...

    Alex Campbell

    • 0
    • 0
    • 0
    Have you ever wondered how you can work with large volumes of data sets? 
    Do you ever think about how you can use these data sets to identify hidden patterns and make an informed decision? 
    Do you know where you can collect this information? 
    Have you ever questioned what you can do with incomplete or incorrect data sets? 
    If you said yes to any of these questions, then you have come to the right place. 
    Most businesses collect information from various sources. This information can be in different formats and needs to be collected, processed, and improved upon if you want to interpret it. You can use various data mining tools to source the information from different places. These tools can also help with the cleaning and processing techniques. 
    You can use this information to make informed decisions and improve the efficiency and methods in your business. Every business needs to find a way to interpret and analyze large data sets. To do this, you will need to learn more about the different libraries and functions used to improve data sets. Since most data professionals use Python as the base programming language to develop models, this book uses some common libraries and functions from Python to give you a brief introduction to the language. 
    If you are a budding analyst or want to freshen up on your concepts, this book is for you. It has all the basic information you need to help you become a data analyst or scientist.
    Show book
  • Brand Seduction - How Neuroscience Can Help Marketers Build Memorable Brands - cover

    Brand Seduction - How...

    Daryl Weber

    • 0
    • 0
    • 0
    An examination of the nature of brands, how they exist and behave in the mind, and how marketers and business leaders can use this to their advantage. 
     
    In Brand Seduction, author Daryl Weber reveals the latest psychological and neuroscientific discoveries about how our minds process brand information and makes decisions, and the important roles our emotions and unconscious play in our selections. 
     
    Through simple language, engaging stories, and real-world examples, Brand Seduction shows you how to decode, build, and use these hidden brand fantasies to grow your brand and business. 
     
    Praise for Brand Seduction 
     
    “Powerful, profound, and beautifully written, Brand Seduction raises the bar for every marketer to do work that truly matters.” —Seth Godin, author of All Marketers Are Liars 
     
    “Clever, creative, and jam-packed with useful insights, Brand Seduction shows how our brain secretly shapes our choices in ways we may never have realized.” —Jonah Berger, Wharton Professor and bestselling author of Contagious and Invisible Influence 
     
    “With solid research and real-world examples, Daryl Weber makes the science of marketing inspiring and actionable. Brand Seduction is a valuable tool for anyone seeking to leverage the power of their brands.” —Nir Eyal, author of Hooked
    Show book
  • A Jealous God - The Religion of Science and Its Vicious Assault on Traditional Faith - cover

    A Jealous God - The Religion of...

    Pamela R. Winnick

    • 0
    • 0
    • 0
    A look at the personal and professional motivations behind the scientific community’s dogmatic rejection of religion and how this impacts the culture. 
     
    The age-old war between religion and science has taken a new twist. Once the dedicated scientist-martyr fought heroically against rigid religionists. But now the tables have turned, and it is established science crusading against religion, pushing atheistic agendas in the classroom, in textbooks, and in the media. This book shows how science has now become a religion of its own—an often fanatical one at that—furiously preaching atheism, punishing dissenters, dictating how and what we should think, and subtly inserting its worldviews in everything from education to entertainment. And, with stunning clarity, it proves that, with billions of dollars up for grabs in the race for stem cell research, intellectual integrity has been replaced with good old-fashioned greed. With sharp insight and completely original reporting, this book defiantly shows the extent to which science is beating down religion and how this systematic tyranny is unmistakably weakening culture and society.
    Show book