Skip to Content
Our misssion: to make the life easier for the researcher of free ebooks.


Apache-Empire-db tutorial

This tutorial demonstrates in eight easy steps how to work with Apache-Empire-db and perform the most common tasks of data persistence: inserting, updating and deleting records as well as performing queries with a simple and ready to run example application. For more advanced topics like complex queries, bulk operations and dynamic data model changes there is a second example application provided with the release.

The sample application used for this tutorial is provided with the Apache-Empire-db distribution and can be found in the examples/DBSample directory. If you are using the Eclipse IDE there is also an Eclipse project file that allows you to open the project straight away. In your IDE, set a breakpoint on the first line of the main method in and debug the sample.

PHP/MySQL Tutorial

Unless you've been living on Mars for the last six to eight months, you've heard of open source software (OSS). This movement has got so much momentum that even the big boys are taking notice. Companies like Oracle, Informix, and a host of others are releasing their flagship database products for that poster child of the OSS movement, Linux.

Having a massively complex RDBMS (relational database management system) is all well and good if you know what to do with it. But perhaps you are just getting into the world of databases. You've read Jay's article and you want to put up your own data-driven Web site. But you find you don't have the resources or desire for an ASP server or some pricey database. You want something free, and you want it to work with Unix.

Security in MySQL

Screen shot Ebook Security in MySQL

When thinking about security within MySQL you should consider a wide range of possible topics and how they might affect the security of your MySQL server and related applications.

All of the following are issues that you should be aware of:

    • Security of the installation itself. The data files, log files, and the all the application files of your installation should be protected to ensure that they are not readable or writable by unauthorized parties. For more information, see Chapter 2, Post-Installation Setup and Testing.

    • Access control and security within the database system itself, including the users and databases granted with access to the databases, views and stored programs in use within the database. For more information, see Chapter 3, The MySQL Access Privilege System, Chapter 4, MySQL User Account Management.

    • Network security of MySQL and your system. The security is related to the grants for individual users, but you may also wish to re-strict MySQL so that is only available locally, or to a limited set of hosts.

    • Security of your application to ensure that SQL injections and other corruption of the data does not occur. See Chapter 1, General Security Issues.

    • Ensure that you have adequate and appropriate backups of your database files, configuration and log files. Also be sure that you have a recovery solution in place and test that you are able to successfully recover the information from your backups.

Beginners Guide to Website Creation

This guide is intended for beginners, and is not intended to be a complete dissection of all the intricacies of the technical process. The goal is to enable the beginner to start using the Internet today without knowing all the technicalities involved, but will be able to harness the power and excitement of the Internet. Simplified explanations of what is happening are usually not exactly what is going on, but they allow the concepts behind the technology to be learned easily.

The Costs And Benefits of Home-Based Telecommuting

Recent technological advances in the personal computer and telecommunications sectors have made information more accessible and telecommuting more viable than ever. Yet despite continued claims of great potential for mitigating urban traffic congestion and improving air quality, important questions remain unanswered regarding the cost-effectiveness of telecommuting as a business operations strategy.

The Instruments of Power: a Computer-Assisted Game for The ACSC Curriculum

The Instruments of Power (IOP) game was developed to satisfy the need for a strategic level educational wargame that can be deployed in the Air Command and Staff College (ACSC) curriculum. The game illustrates some of the key interrelations of the four instruments of national power—Diplomatic (D), Informational (I), Military (M), and Economic (E)—by providing the players an opportunity to exercise them in a graphic, interactive game format. The intent was to make a game that is easy to play, adaptable, educational, and fun. The game does not attempt to be a high fidelity political/military simulation, purposely leaving many features at an abstract level to speed play and help players focus on strategic concepts versus the tactical details of combat.

Technical Report Smart Laboratory Instruction Sheets

This report details the technical work undertaken during an investigation of the feasibility of activating laboratory instruction sheets presented in Microsoft Word 2003 by employing the built-in Visual Basic for Applications programming environment. It is based on practical implementation for electrical science laboratories operated for an engineering foundation year course at Coventry University. An introduction to Visual Basic for Applications and its associated development environment are provided for new users. The main features of Visual Basic for Applications deployed are presented with detailed examples that will enable the techniques to be efficiently reproduced for other laboratories or other purposes.

Improving Simulation Tools for Ford Motor Company

This project is not a common research thesis, it has a part of research developed to arrive to a goal, but it is not the true objective of it. This project aims to rebuild the program Ford Motor Company is using to simulate the efficiency of its machining lines, named FIRST. Research is required on Ford methods and on the programming, but this is only a tool to achieve the real aim of this project.

Why Print Your Own Work?

The question sounds ludicrous and in a way it is; but it is a question I was asked and therefore it is a one that is obviously on the minds of some people. In a way, this question points to a deeper problem - a problem that I would describe as a certain lack of knowledge of the digital photographic process in particular and of the artistic process in general. For this reason I decided to write an essay on a subject that I would, otherwise, have brushed off to the side as irrelevant and a waste of my time. Ludicrous it may be. To write about it may be as well. After all, I could have other people print for me.

The Virtual Reality Modelling Language in Art and Design Higher Education

The World-Wide Web, which will be abbreviated to WWW or the Web throughout this document is an increasingly popular means of providing and accessing information. Its success is due to a variety of reasons, including:

l Cross-platform portability. WWW servers and clients (programs which retrieve the information held on the server) can work on different computer systems.
l It uses the infrastructure of the Internet. The Web uses the global connection of networks and communication protocols of the internet.
l It is free. Generally when information is published on the Web, no charge is made for viewing it. Much of the software needed for creating, serving and browsing Web documents is also freely available.
l It is easy to use. The WWW is a multimedia hypertext system. Documents can contain links to other Web information, which are retrieved when the user selects highlighted text or images (usually by clicking with the mouse). The other information may be image, audio and video files as well as more text documents. The rich format of hyperlinked text and graphics is created using the Hypertext Markup Language (HTML).

Syndicate content