Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
MySQL for Python

You're reading from   MySQL for Python Integrating MySQL and Python can bring a whole new level of productivity to your applications. This practical tutorial shows you how with examples and explanations that clarify even the most difficult concepts.

Arrow left icon
Product type Paperback
Published in Sep 2010
Publisher Packt
ISBN-13 9781849510189
Length 440 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Albert Lukaszewski Albert Lukaszewski
Author Profile Icon Albert Lukaszewski
Albert Lukaszewski
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

MySQL for Python
Credits
About the Author
About the Reviewers
Preface
1. Getting Up and Running with MySQL for Python FREE CHAPTER 2. Simple Querying 3. Simple Insertion 4. Exception Handling 5. Results Record-by-Record 6. Inserting Multiple Entries 7. Creating and Dropping 8. Creating Users and Granting Access 9. Date and Time Values 10. Aggregate Functions and Clauses 11. SELECT Alternatives 12. String Functions 13. Showing MySQL Metadata 14. Disaster Recovery Index

A word on security


On October 2, 2007, a colocation data centre run by C I Host in Chicago, Illinois (U.S.A) was robbed for the fourth time in two years. Robbers took $15,000 worth of servers.

On December 6, 2007, thieves stole $4 million worth of servers from a Verizon data centre in London, England.

On May 5, 2008, Peter Gabriel's official website went offline. Users of his Real World-Peter Gabriel and WOMAD services lost all access. The reason is that thieves had stolen the servers from a data centre run by a Carphone Warehouse subsidiary named Rednet Ltd.

As mentioned previously, if an adequate access control system is in place, rogue users are trusted insiders by definition. However, it is worth noting that such a control system is not merely software. Every avenue of attack—from brute force password cracking to using social engineering on a receptionist, is a vector of attack against a database. By virtue of its involving human users, an adequate access control system must provide adequate...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image