¡Acompáñanos a viajar por el mundo de los libros!
Añadir este libro a la estantería
Grey
Escribe un nuevo comentario Default profile 50px
Grey
Suscríbete para leer el libro completo o lee las primeras páginas gratis.
All characters reduced
The Best Way to Learn Java GUI with MySQL MariaDB and PostgreSQL - cover

¡Lo sentimos! La editorial o autor ha eliminado este libro de nuestro catálogo. Pero no te preocupes, tenemos más de 500.000 otros libros que puedes disfrutar.

The Best Way to Learn Java GUI with MySQL MariaDB and PostgreSQL

Vivian Siahaan, Rismon Hasiholan Sianipar

Editorial: SPARTA PUBLISHING

  • 0
  • 0
  • 0

Sinopsis

In this book, you will create three Java GUI applications using MySQL, MariaDB, and PostgreSQL. In this book, you will learn how to build from scratch a database management system using Java. In designing a GUI and as an IDE, you will make use of the NetBeans tool. Gradually and step by step, you will be taught how to utilize three different databases in Java. 
In chapter one, you will create School database and its six tables. In chapter two, you will study: Creating the initial three table projects in the school database: Teacher table, TClass table, and Subject table; Creating database configuration files; Creating a Java GUI for viewing and navigating the contents of each table; Creating a Java GUI for inserting and editing tables; and Creating a Java GUI to join and query the three tables. 
In chapter three, you will learn: Creating the main form to connect all forms; Creating a project will add three more tables to the school database: the Student table, the Parent table, and Tuition table; Creating a Java GUI to view and navigate the contents of each table; Creating a Java GUI for editing, inserting, and deleting records in each table; Creating a Java GUI to join and query the three tables and all six. 
In chapter four, you will study how to query the six tables. 
In chapter five, you will learn the basics of cryptography using Java. Here, you will learn how to write a Java program to count Hash, MAC (Message Authentication Code), store keys in a KeyStore, generate PrivateKey and PublicKey, encrypt / decrypt data, and generate and verify digital prints. In chapter six, you will create Bank database and its tables. 
In chapter seven, you will learn how to create and store salt passwords and verify them. You will create a Login table. In this case, you will see how to create a Java GUI using NetBeans to implement it. In addition to the Login table, in this chapter you will also create a Client table. In the case of the Client table, you will learn how to generate and save public and private keys into a database. You will also learn how to encrypt / decrypt data and save the results into a database. 
In chapter eight, you will create an Account table. This account table has the following ten fields: account_id (primary key), client_id (primarykey), account_number, account_date, account_type, plain_balance, cipher_balance, decipher_balance, digital_signature, and signature_verification. In this case, you will learn how to implement generating and verifying digital prints and storing the results into a database. 
In chapter nine, you will create a Client_Data table, which has the following seven fields: client_data_id (primary key), account_id (primary_key), birth_date, address, mother_name, telephone, and photo_path. 
In chapter ten, you will be taught how to create Crime database and its tables. In chapter eleven, you will be taught how to extract image features, utilizing BufferedImage class, in Java GUI. 
In chapter twelve, you will be taught to create Java GUI to view, edit, insert, and delete Suspect table data. This table has eleven columns: suspect_id (primary key), suspect_name, birth_date, case_date, report_date, suspect_ status, arrest_date, mother_name, address, telephone, and photo. 
In chapter thirteen, you will be taught to create Java GUI to view, edit, insert, and delete Feature_Extraction table data. This table has eight columns: feature_id (primary key), suspect_id (foreign key), feature1, feature2, feature3, feature4, feature5, and feature6.
Disponible desde: 31/01/2020.

Otros libros que te pueden interesar

  • In the Valleys of the Noble Beyond - In Search of the Sasquatch - cover

    In the Valleys of the Noble...

    John Zada

    • 0
    • 0
    • 0
    On the central and north coast of British Columbia, the Great Bear Rainforest is the largest intact temperate rainforest in the world, containing more organic matter than any other terrestrial ecosystem on the planet. The area plays host to a wide range of species, from thousand-year-old western cedars to humpback whales to iconic white Spirit bears. According to local residents, another giant is said to live in these woods. For centuries, people have reported encounters with the Sasquatch?a species of hairy, bipedal man-apes said to inhabit the deepest recesses of this pristine wilderness. Driven by his own childhood obsession with the creatures, John Zada decides to seek out the diverse inhabitants of this rugged and far-flung coast, where nearly everyone has a story to tell, from a scientist who has dedicated his life to researching the Sasquatch to members of the area’s First Nations and a former grizzly-bear hunter-turned-nature tour guide. With each tale, Zada discovers that his search for the Sasquatch is a quest for something infinitely more complex, cutting across questions of human perception, scientific inquiry, indigenous traditions, the environment, and the power and desire of the human imagination to believe in?or reject?something largely unseen.
    Ver libro
  • Renewable energy and climate pledges: Five years after the Paris Agreement - cover

    Renewable energy and climate...

    International Renewable Energy...

    • 0
    • 0
    • 0
    With signing of the Paris Agreement, countries pledged to reduce carbon dioxide (CO2) and other greenhouse gas emissions, as well as to adapt to the impacts of climate change. By scaling up renewable energy, countries can sharply reduce one major source of the problem: energy-related CO2 emissions.
    Nationally Determined Contributions (NDCs) quantify the commitment of each Party (or signatory that has ratified the Paris Agreement) to reduce CO2 and other greenhouse gas emissions, as well as to adapt to the impacts of climate change.
    This brief updates ongoing NDC analysis by the International Renewable Energy Agency (IRENA) based on new pledges submitted in 2020. IRENA supports countries in the implementation and enhancement of their NDCs through accelerated deployment of renewables.
    Ver libro
  • Summary: Why We Sleep - Unlocking the Power of Sleep and Dreams by Matthew Walker PhD: Key Takeaways Summary & Analysis Included - cover

    Summary: Why We Sleep -...

    Brooks Bryant

    • 0
    • 0
    • 0
    Disclaimer: This is not the official book, but a summary & it does not accompany the official. 
    The book takes readers on a journey through the intricacies of the sleeping mind, exploring the various sleep stages and the distinct purposes they serve. Walker doesn't just stop at illustrating the beneficial aspects of good sleep; he sheds light on the perilous path that chronic sleep deprivation can lead individuals down, impacting everything from memory retention to the immune system. 
    By amalgamating scientific research with accessible narratives, the book unravels the complex relationship between sleep and a host of other factors including diet, exercise, and mental health. It explains how sleep can dictate emotional well-being, decision-making, and even the predisposition to diseases such as Alzheimer's and cancer. 
    In a society where sleep deprivation is often worn as a badge of honor, "Why We Sleep" issues a clarion call to re-evaluate our approach to sleep. Walker provides a comprehensive overview of the latest findings in sleep science, effectively dismissing myths and misconceptions that have long surrounded this essential biological function. He offers practical advice on how to nurture sleep, enhancing its quality and, consequently, improving overall health and well-being. 
    As you summarize this groundbreaking book, emphasize the indispensable role of sleep that the author underlines through a spectrum of scientific facts and real-life examples. Illustrate how the book serves as both a wake-up call and a guide, encouraging readers to foster healthier sleep habits to unlock a more fulfilling and healthier life.
    Ver libro
  • Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain - cover

    Ultimate Blockchain Security...

    Taha Sajid

    • 0
    • 0
    • 0
    KEY FEATURES 
    -  An in-depth examination of the security aspects of Bitcoin, Ethereum, and Hyperledger Fabric.
    -  Comprehensive coverage of smart contract vulnerabilities, attack analysis, and effective security measures.
    -  Leverage Blockchain Risk Management Framework for managing risks associated with blockchain technology
    -  Practical insights into testing and assessing the security of blockchain applications.
    -  Strategies and solutions for robust access control using blockchain-based identity and access management.
    -  Expert insights on identifying and categorizing risks using advanced threat modeling techniques.
    DESCRIPTIONThe Ultimate Blockchain Security Handbook will help you identify and remediate your Blockchain solution bugs before others do. Covering the latest threats and vulnerabilities, as well as effective mitigation strategies, it takes you on a journey from the security foundations of blockchain technology to implementing advanced security solutions for blockchain applications. It helps you identify, assess, and mitigate risks using a variety of tools and techniques, including threat modeling, penetration testing, vulnerability scanning, attack analysis, and security audits. It covers formal verification methods for testing smart contract code, with an application of the K semantic framework. It then explores a range of blockchain security solutions, including zero-knowledge proof architecture, access control design, establishment of robust public key infrastructures, and the implementation of security logging and monitoring tools to track activities effectively.
    WHAT WILL YOU LEARN 
    -  Acquire proficiency in efficiently assessing and categorizing risks through comprehensive threat modeling exercises.
    -  Learn to conduct thorough audits of smart contracts and blockchain applications using diverse tools, formal verification methods, and established frameworks.
    -  Learn to design secure blockchain architectures by implementing cutting-edge techniques, including zero-knowledge proofs, access controls, PKI (Public Key Infrastructure), and robust security logging.
    -  Learn  to take appropriate actions when encountering cryptocurrency-related internet scams, ensuring a safer digital environment.
    WHO IS THIS BOOK FOR?
    This book is tailored for blockchain developers, architects, security experts, software professionals, and researchers/cryptographers seeking in-depth knowledge of blockchain security. Whether you're building blockchain systems, strengthening security expertise, integrating blockchain into software, or delving into advanced research, this book equips you with essential skills and insights.
    TABLE OF CONTENTS 
    1. Blockchain Security Overview
    2. Blockchain Security Variations
    3. Attack Vectors Management on Blockchain
    4. Blockchain Application Exploitation
    5. Blockchain Application Audit
    6. Blockchain Security Solution    
    Index
    Ver libro
  • First In Last Out - Leadership Lessons from the New York Fire Department - cover

    First In Last Out - Leadership...

    FDNY John Salka Batallion Chief,...

    • 0
    • 0
    • 0
    What does it take to lead people into a burning building? How do the leaders of the New York City Fire Department develop so much loyalty, trust, and grace under pressure that their subordinates will risk their very lives for them?As a high-ranking officer of the FDNY, John Salka is an expert at both practicing and teaching high-stakes leadership. In First In, Last Out, he explains the department's unique strategies and how they can be adopted by leaders in any field—as he has taught them to organizations around the country. In a tough-talking, no-nonsense style, Salka uses real-world stories to convey leadership imperatives such as:● First in, last out—your people need to see you taking the biggest risk, as the first one to enter the danger zone and the last to leave● Manage change—the fire you fought yesterday is not the one you'll be fighting tomorrow● Communicate aggressively—a working radio is worth more than 20,000 gallons of water● Create an execution culture—focus your people on the flames, not the smoke● Commit to reality—never allow the way you would like things to be to color how things are
    Ver libro
  • Hypnosis for Deep Sleep - Rewire Your Mindset And Get Fast Results With Hypnosis! - cover

    Hypnosis for Deep Sleep - Rewire...

    Empowered Living

    • 0
    • 0
    • 0
    The advantages of hypnosis therapy are widespread. A lot of individuals report positive changes with hypnosis and it's recognized as a valid type of holistic alternative medicine.  
    Hypnosis is a popular technique utilized for weight loss, overcoming addiction, healing, achieving goals, relaxation and stress relief. It's utilized to get rid of undesired behaviors and beliefs and to manifest new desires and achieve goals in life. 
      
    If you wish to influence your subconscious mind to accept new programming for positive alterations hypnosis is an effective technique for doing that. 
    Among the chief advantages of hypnosis is that when you in a hypnotic state brain wave frequencies decelerate. You center or focus your awareness and you're actually much more aware than usual. A state of centered awareness almost feels as though you're more of an observer of thought and images rather than a part of them. This allows you to bypass the "gatekeepers" at the entrance to the subconscious and superconscious so you are able to access these levels of consciousness directly, and the brain is much more receptive to suggestion. 
    The unconscious, or subconscious may then be reprogrammed so it lets go of old patterns, beliefs and feelings that no longer serve you. They may be replaced with suggestions that are favorable and affirming. The superconscious mind may open you into fresh insights and originative ideas.  
    Put this audio on each night before you go to bed and listen to it right before you fall asleep. If you have time also listen to it first thing upon waking. Do this for at least 21 days consistently so that positive change can take affect in your life.
    Ver libro