09.11.2016 Views

Foundations of Python Network Programming 978-1-4302-3004-5

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

■ CONTENTS<br />

Connecting and Authenticating ................................................................................... 235<br />

Obtaining Mailbox Information .................................................................................... 238<br />

Downloading and Deleting Messages ......................................................................... 239<br />

Summary ..................................................................................................................... 241<br />

■Chapter 15: IMAP .............................................................................................. 243<br />

Understanding IMAP in <strong>Python</strong> .................................................................................... 244<br />

IMAPClient ................................................................................................................... 246<br />

Examining Folders ...................................................................................................... 248<br />

Message Numbers vs. UIDs ........................................................................................ 248<br />

Message Ranges ......................................................................................................... 249<br />

Summary Information ................................................................................................. 249<br />

Downloading an Entire Mailbox .................................................................................. 250<br />

Downloading Messages Individually ........................................................................... 252<br />

Flagging and Deleting Messages ................................................................................ 257<br />

Deleting Messages ...................................................................................................... 258<br />

Searching .................................................................................................................... 259<br />

Manipulating Folders and Messages .......................................................................... 260<br />

Asynchrony ................................................................................................................. 261<br />

Summary ..................................................................................................................... 261<br />

■Chapter 16: Telnet and SSH ............................................................................... 263<br />

Command-Line Automation ........................................................................................ 263<br />

Command-Line Expansion and Quoting ...................................................................... 265<br />

Unix Has No Special Characters .................................................................................. 266<br />

Quoting Characters for Protection ............................................................................... 268<br />

The Terrible Windows Command Line ........................................................................ 269<br />

Things Are Different in a Terminal .............................................................................. 270<br />

Terminals Do Buffering ............................................................................................... 273<br />

xii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!