Python 2.1 Bible

By David Brueck

This publication is perfect for those who have programmed in different programming languages.
It starts off with a bit entitled "Python in an Hour", which takes you thru all the key ideas of Python, earlier than relocating directly to an entire reference of the Python language.

The ultimate chapters run via on the subject of every thing you'll are looking to do with the language, from the fundamentals reminiscent of strings, dossier I/O and common expressions via to databases, XML and graphics.

Remember in case you do like what you've obvious then do an online seek and purchase the book.

Show description

Preview of Python 2.1 Bible PDF

Similar Computing books

Robot Programming : A Practical Guide to Behavior-Based Robotics

* Teaches the thoughts of behavior-based programming via textual content, programming examples, and a special on-line simulator robotic * Explains the best way to layout new behaviors via manipulating outdated ones and adjusting programming * doesn't suppose reader familiarity with robotics or programming languages * encompasses a part on designing your individual behavior-based method from scratch

Microsoft SQL Server 2012 A Beginners Guide 5/E

Crucial Microsoft SQL Server 2012 talents Made effortless wake up and operating on Microsoft SQL Server 2012 very quickly with aid from this completely revised, functional source. packed with real-world examples and hands-on routines, Microsoft SQL Server 2012: A Beginner's advisor, 5th variation begins by means of explaining basic relational database method recommendations.

Java: The Complete Reference, Ninth Edition

The Definitive Java Programming advisor totally up-to-date for Java SE eight, Java: the full Reference, 9th version explains the way to improve, collect, debug, and run Java courses. Bestselling programming writer Herb Schildt covers the whole Java language, together with its syntax, key words, and primary programming rules, in addition to major parts of the Java API library.

Introduction to Cryptography with Coding Theory (2nd Edition)

With its conversational tone and sensible concentration, this article mixes utilized and theoretical features for an outstanding advent to cryptography and safeguard, together with the most recent major developments within the box. Assumes a minimum history. the extent of math sophistication is resembling a direction in linear algebra.

Extra resources for Python 2.1 Bible

Show sample text content

219 219 220 220 221 222 222 223 223 224 224 225 226 226 227 bankruptcy 14: utilizing Databases . . . . . . . . . . . . . . . . . . . . . . . 229 utilizing Disk-Based Dictionaries . . . . . . . . . DBM instance: monitoring cellphone Numbers complicated Disk-Based Dictionaries . . . . . . dbm . . . . . . . . . . . . . . . . . . . . gdbm . . . . . . . . . . . . . . . . . . . . dbhash . . . . . . . . . . . . . . . . . . . utilizing BSD database gadgets . . . . . . getting access to Relational Databases . . . . . . . . Connection items . . . . . . . . . . . Transactions . . . . . . . . . . . . . . . Cursor items . . . . . . . . . . . . . . instance: “Sounds-Like” Queries . . . . . . . reading Relational Metadata . . . . . . . . instance: growing Auditing Tables . . . . . . complicated positive aspects of the DB API . . . . . . . enter and output sizes . . . . . . . . . . Reusable SQL statements . . . . . . . . Database library info . . . . . . errors hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . half III: Networking and the web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 231 232 232 232 233 233 234 234 234 235 235 237 238 240 241 242 242 243 245 bankruptcy 15: Networking . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Networking heritage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 operating with Addresses and Host Names . . . . . . . . . . . . . . . . . . . 248 xxiii 4807-7 FM. F xxiv 5/24/01 8:57 AM web page xxiv Python 2. 1 Bible speaking with Low-Level Sockets . . . . developing and destroying sockets . . . . . Connecting sockets . . . . . . . . . . . . Sending and receiving information . . . . . . . . utilizing socket suggestions . . . . . . . . . . . . changing numbers . . . . . . . . . . . . instance: A Multicast Chat program . . . . utilizing SocketServers . . . . . . . . . . . . . . . The SocketServer kinfolk . . . . . . . . . . Request handlers . . . . . . . . . . . . . . Processing internet Browser Requests . . . . . . . BaseHTTPRequestHandler . . . . . . . . SimpleHTTPRequestHandler . . . . . . . CGIHTTPRequestHandler . . . . . . . . . instance: shape handler CGI script . . . . dealing with a number of Requests with no Threads asyncore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 250 251 252 253 256 256 261 261 263 264 265 266 267 267 269 271 bankruptcy sixteen: conversing net Protocols . . . . . . . . . . . . . . . . 275 Python’s web Protocol help . . . Retrieving net assets . . . . . . . Manipulating URLs . . . . . . . . . . Treating a URL as a dossier . . . . . . . URLopeners . . . . . . . . . . . . . prolonged URL beginning . . . . . . . Sending HTTP Requests . . . . . . . . . . development and utilizing request gadgets Sending and Receiving electronic mail . . . . . . . having access to POP3 money owed . . . . . . having access to SMTP debts . . . . . having access to IMAP debts .

Download PDF sample

Rated 4.93 of 5 – based on 19 votes