15.04.2018 Views

programming-for-dummies

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table of Contents<br />

xxi<br />

Declaring Constants.....................................................................................595<br />

Using Operators ...........................................................................................596<br />

Branching Statements .................................................................................597<br />

Looping Statements .....................................................................................600<br />

Creating Subprograms and Functions .......................................................601<br />

Data Structures.............................................................................................603<br />

Creating a structure ...........................................................................603<br />

Creating an array................................................................................603<br />

Creating a collection and a dictionary.............................................604<br />

Creating Objects...........................................................................................605<br />

Book VII: Applications...............................................607<br />

Chapter 1: Database Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . .609<br />

The Basics of Databases..............................................................................609<br />

Free-<strong>for</strong>m databases...........................................................................610<br />

Flat-file databases...............................................................................611<br />

Relational databases..........................................................................613<br />

Manipulating Data ........................................................................................617<br />

Writing database commands ............................................................620<br />

The SQL language...............................................................................620<br />

Data integrity ......................................................................................621<br />

Data mining .........................................................................................622<br />

Database Programming ...............................................................................622<br />

Chapter 2: Bioin<strong>for</strong>matics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .625<br />

The Basics of Bioin<strong>for</strong>matics......................................................................625<br />

Representing molecules ....................................................................626<br />

Manipulating molecules in a computer ...........................................627<br />

Searching Databases....................................................................................628<br />

Bioin<strong>for</strong>matics Programming......................................................................630<br />

Chapter 3: Computer Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .633<br />

Stopping Malware.........................................................................................634<br />

Viruses .................................................................................................634<br />

Worms..................................................................................................635<br />

Trojan horses......................................................................................636<br />

Spyware ...............................................................................................636<br />

Stopping Hackers .........................................................................................637<br />

Intrusion detection systems .............................................................637<br />

Rootkit detectors................................................................................638<br />

Forensics .............................................................................................639<br />

Secure Computing........................................................................................639<br />

Patching as an afterthought..............................................................640<br />

Security in coding...............................................................................640<br />

Security by design..............................................................................641

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!