24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi. OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2
|
|
|
- Rosa O’Connor’
- 10 years ago
- Views:
Transcription
1 24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2
2 PROBLEMA REALE In un database nella Tabella: account_move il Campo: id_partner Non è sempre presente 2
3 TUTTI I MOVIMENTI SENZA PARTNER SONO ABBINATI AL PRIMO ID_PARTNER DELLA TABELLA account_move_line 3
4 TABELLA account_move_line 4
5 SCRITTO PROGRAMMA IN PYTHON E XML-RPC... # SEARCH ID ACCOUNT MOVE LINE args = [('state', '=', 'valid')] ids = sock.execute(dbname, uid, pwd, 'account.move.line', 'search', args) splitids=str(ids).split(',') print splitids rowcount=1 for row in splitids: if rowcount == len(ids): idmove = int(row[1:-1]) else: idmove=int(row[1:]) print idmove fields = ['partner_id','move_id'] #fields to read data = sock.execute(dbname, uid, pwd, 'account.move.line', 'read',idmove, fields) splitdata = str(data).split(',') if splitdata[0][15:] <> 'False': idpartner = int(splitdata[0][16:]) print data...esempio read xml-rpc {'partner_id': [231, 'Sguasxxxx Licia'], 'id': 19, 'move_id': [10, 'BNK2/2013/0004']} 5
6 TABELLA account_move CORRETTAMENTE ABBINATA 6
7 XML-RPC TIME:
8 SCRITTO PROGRAMMA IN PYTHON E PSYCOPG2... c_line.execute("select move_id, partner_id, credit, debit FROM account_move_line WHERE (partner_id > 0) ORDER by partner_id") c_line.execute("select DISTINCT move_id, partner_id FROM account_move_line ORDER by partner_id") row_count = 0 for row in c_line: row_count += 1 update_line="update account_move SET partner_id=%s where id=%s" try: c_move.execute(update_line,(row[1],row[0],)) print update_line print "Cursor_row:%s - Partner_id:%s - Move_id:%s" %(row_count, row[1], row[0],) except psycopg2.databaseerror, e: print e.pgcode print e.pgerror sys.exit() c_move.execute("commit") 8
9 BASIC MODULE USAGE - PSYCOPG2 >>> import psycopg2 # Connect to an existing database >>> conn = psycopg2.connect("dbname=test user=postgres") # Open a cursor to perform database operations >>> cur = conn.cursor() # Execute a command: this creates a new table >>> cur.execute("create TABLE test (id serial PRIMARY KEY, num integer, data varchar);") # Pass data to fill a query placeholders and let Psycopg perform # the correct conversion (no more SQL injections!) >>> cur.execute("insert INTO test (num, data) VALUES (%s, %s)",... (100, "abc'def")) # Query the database and obtain data as Python objects >>> cur.execute("select * FROM test;") >>> cur.fetchone() (1, 100, "abc'def") # Make the changes to the database persistent >>> conn.commit() # Close communication with the database >>> cur.close() >>> conn.close() 9
10 DATABASE ERROR TEST- PSYCOPG2 #!/usr/bin/python # Replace <USERNAME_DATABASE>, <USERNAME>, and <PASSWORD> below with your actual DB, user, and password. import psycopg2 import sys con = None try: con = psycopg2.connect(database='<username_database>', user='<username>', password='<password>') cur = con.cursor() cur.execute("select * FROM testschema.testtable")1 rows = cur.fetchall() for row in rows: print row except psycopg2.databaseerror, e: print 'Error %s' % e sys.exit(1) finally: if con: con.close() 10
11 SELECT PSYCOPG2 - TIME:
12 SELECT DISTINCT PSYCOPG2 - TIME:
13 SQL EXISTS - UPDATE EXAMPLE UPDATE suppliers SET supplier_name = (select customers.name from customers where customers.customer_id = suppliers.supplier_id) WHERE EXISTS (select customers.name from customers where customers.customer_id = suppliers.supplier_id); 13
14 SCRITTO PROGRAMMA IN PYTHON E SQL EXISTS... try: conn = psycopg2.connect(conn_string) # print the connection string we will use to connect print "Connecting to database\n->%s" % (conn_string) cur = conn.cursor() update_set = "UPDATE account_move SET partner_id = " update_select = "(SELECT DISTINCT partner_id FROM account_move_line WHERE account_move.id = account_move_line.move_id)" cur.execute(update_set + update_select + " WHERE EXISTS " +update_select) cur.execute("commit") cur.close() conn.close() except psycopg2.databaseerror, e: print e.pgcode print e.pgerror sys.exit() 14
15 SQL EXISTS PSYCOPG2 TIME
16 SCRIPT PSQL E SQL EXISTS T="$(date +%s)" psql -U demo -d acsi7demo -c "UPDATE account_move SET partner_id = (SELECT DISTINCT partner_id FROM account_move_line WHERE account_move.id = account_move_line.move_id) WHERE EXISTS (SELECT DISTINCT partner_id FROM account_move_line WHERE account_move.id = account_move_line.move_id)" T="$(($(date +%s)-t))" echo $T 16
17 SCRIPT PSQL E SQL EXISTS TIME: 0 17
18 PSQL E SQL EXISTS TIME: 0,034 18
19 ANALISI PRESTAZIONALE 19
20 XML-RPC VS PSYCOPG2 XML-RPC VANTAGGI: SICUREZZA CONTROLLO ORM OPENERP UTILIZZO Etichette CAMPI PSYCOPG2 VANTAGGI: VELOCITA' UTILIZZO SQL STANDARD PORTABILITA' QUERY 20
21 RINGRAZIAMENTI Associazione OpenERP Italia openerpday.it Italian PostgreSQL Users Group pgday.it 21
22 Q&A CONTATTI 22
SQL: Programming. Introduction to Databases CompSci 316 Fall 2014
SQL: Programming Introduction to Databases CompSci 316 Fall 2014 2 Announcements (Tue., Oct. 7) Homework #2 due today midnight Sample solution to be posted by tomorrow evening Midterm in class this Thursday
Writing MySQL Scripts With Python's DB-API Interface
Writing MySQL Scripts With Python's DB-API Interface By Paul DuBois, NuSphere Corporation (October 2001) TABLE OF CONTENTS MySQLdb Installation A Short DB-API Script Writing the Script Running the Script
Writing MySQL Scripts with Python DB-API
Writing MySQL Scripts with Python DB-API Paul DuBois [email protected] Document revision: 1.02 Last update: 2006-09-17 Python is one of the more popular Open Source programming languages, owing largely
OpenERP: 100% pythonic way for business management
OpenERP: 100% pythonic way for business management Florence, June 23rd 2011 Davide Corio [email protected] Origin of ERP Origin of "ERP" In 1990 Gartner Group first employed the acronym ERP as an
SQL Injection Vulnerabilities in Desktop Applications
Vulnerabilities in Desktop Applications Derek Ditch (lead) Dylan McDonald Justin Miller Missouri University of Science & Technology Computer Science Department April 29, 2008 Vulnerabilities in Desktop
IRC Bots. Lance Buttars AKA Nemus. Code From This Talk https://github.com/obscuritysystems/irc_talk
IRC Bots Lance Buttars AKA Nemus Code From This Talk https://github.com/obscuritysystems/irc_talk Ready Made Bots Phenny - Python http://inamidst.com/phenny/ Cinch Ruby https://github.com/cinchrb/cinch
How and When to Use Dynamic Lookups
Copyright 2013 Splunk Inc. How and When to Use Dynamic Lookups Nimish Doshi Principal Systems Engineer, Splunk #splunkconf Legal NoIces During the course of this presentaion, we may make forward- looking
Using IRDB in a Dot Net Project
Note: In this document we will be using the term IRDB as a short alias for InMemory.Net. Using IRDB in a Dot Net Project ODBC Driver A 32-bit odbc driver is installed as part of the server installation.
How to write a bash script like the python? Lloyd Huang. KaLUG - Kaohsiung Linux User Group COSCUP Aug 18 2012
How to write a bash script like the python? Lloyd Huang KaLUG - Kaohsiung Linux User Group COSCUP Aug 18 2012 Before the start Before the start About Bash Python and me. The ipython and lpython.py. A trick,
Persistent Stored Modules (Stored Procedures) : PSM
Persistent Stored Modules (Stored Procedures) : PSM Stored Procedures What is stored procedure? SQL allows you to define procedures and functions and store them in the database server Executed by the database
Cifratura Dati in Tabelle MySQL
Cifratura Dati in Tabelle MySQL Stringa SHA Stringa cifrata SHA = Secure Hash Algorithm Cifratura unidirezionale: impossibile decifrare una stringa cifrata Lunghezza della stringa cifrata = 40: indipendente
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques INFIGO-TD TD-200 2009-04 2009-06 06-17 Leon Juranić [email protected] INFIGO IS. All rights reserved. This document contains information
Streaming multimedia les from relational database
Streaming multimedia les from relational database Tomasz Rybak Applied Systems Division Software Departament Faculty of Computer Science Bialystok Technical University [email protected] Tomasz Rybak
How to Set Up pgagent for Postgres Plus. A Postgres Evaluation Quick Tutorial From EnterpriseDB
How to Set Up pgagent for Postgres Plus A Postgres Evaluation Quick Tutorial From EnterpriseDB February 19, 2010 EnterpriseDB Corporation, 235 Littleton Road, Westford, MA 01866, USA T +1 978 589 5700
MySQL Fabric: High Availability Solution for Connector/Python
DBAHire.com MySQL Fabric: High Availability Solution for Connector/Python Jaime Crespo PyConES 2014 Zaragoza -8 Nov 2014- dbahire.com 1 Table of Contents 1. What is MySQL Fabric? 4. Sharding 2. Installation
Programming in Python V: Accessing a Database
Programming in Python V: Accessing a Database Computer Science 105 Boston University David G. Sullivan, Ph.D. Accessing a Database from Python Import the necessary Python module: import sqlite3 Connect
College Tuition: Data mining and analysis
CS105 College Tuition: Data mining and analysis By Jeanette Chu & Khiem Tran 4/28/2010 Introduction College tuition issues are steadily increasing every year. According to the college pricing trends report
Database Programming. Week 10-2. *Some of the slides in this lecture are created by Prof. Ian Horrocks from University of Oxford
Database Programming Week 10-2 *Some of the slides in this lecture are created by Prof. Ian Horrocks from University of Oxford SQL in Real Programs We have seen only how SQL is used at the generic query
Package sjdbc. R topics documented: February 20, 2015
Package sjdbc February 20, 2015 Version 1.5.0-71 Title JDBC Driver Interface Author TIBCO Software Inc. Maintainer Stephen Kaluzny Provides a database-independent JDBC interface. License
http://www.thedataanalysis.com/sql/sql-programming.html
http://www.thedataanalysis.com/sql/sql-programming.html SQL: UPDATE Statement The UPDATE statement allows you to update a single record or multiple records in a table. The syntax for the UPDATE statement
Open source framework for interactive data exploration in server based architecture
Open source framework for interactive data exploration in server based architecture D5.5 v1.0 WP5 Visual Analytics: D5.5 Open source framework for interactive data exploration in server based architecture
WI005 - Offline data sync con SQLite in Universal Windows Platform
WI005 - Offline data sync con SQLite in Universal Windows Platform presenta Erica Barone Microsoft Technical Evangelist @_ericabarone [email protected] Massimo Bonanni Microsoft MVP, Intel Black Belt
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Oracle Database 12c: SQL Tuning for Developers. Sobre o curso. Destinatários. Oracle - Linguagens. Nível: Avançado Duração: 18h
Oracle Database 12c: SQL Tuning for Developers Oracle - Linguagens Nível: Avançado Duração: 18h Sobre o curso In the Oracle Database: SQL Tuning for Developers course, you learn about Oracle SQL tuning
Relational databases and SQL
Relational databases and SQL Matthew J. Graham CACR Methods of Computational Science Caltech, 29 January 2009 relational model Proposed by E. F. Codd in 1969 An attribute is an ordered pair of attribute
PostgreSQL Functions By Example
Postgre [email protected] credativ Group January 20, 2012 What are Functions? Introduction Uses Varieties Languages Full fledged SQL objects Many other database objects are implemented with them
PostgreSQL as an integrated data analysis platform
PostgreSQL as an integrated data analysis platform FOSS4G.be 2015 Oslandia Team Licence GNU FDL SARL / 29. octobre 2015 / www.oslandia.com / [email protected] Let 's try to Think Different (about PostgreSQL)
Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2
Bernd Ahlers Michael Friedrich Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 BEFORE WE START Agenda AGENDA Introduction Tools Log History Logs & Monitoring Demo The Future Resources
Connecting to a Database Using PHP. Prof. Jim Whitehead CMPS 183, Spring 2006 May 15, 2006
Connecting to a Database Using PHP Prof. Jim Whitehead CMPS 183, Spring 2006 May 15, 2006 Rationale Most Web applications: Retrieve information from a database to alter their on-screen display Store user
src Documentation Release Pierre Humblot
src Documentation Release Pierre Humblot June 02, 2014 Contents 1 src Package 3 1.1 src Package............................................... 3 1.2 Subpackages...............................................
SQL and Java. Database Systems Lecture 19 Natasha Alechina
Database Systems Lecture 19 Natasha Alechina In this Lecture SQL in Java SQL from within other Languages SQL, Java, and JDBC For More Information Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc
Python. Data bases. Marcin Młotkowski. 8th May, 2013
Data bases 8th May, 2013 1 DBM databases 2 3 Types of data storage Trwałe słowniki Klient-serwer SQL Bekreley DB Gnu dbm (n)dbm Firebird Sqlite Oracle MySQL PostgeSQL DB/2 DBM databases Database manager
USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)
USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To
Automated ETL Testing with Py.Test. Kevin A. Smith Senior QA Automation Engineer Cambia Health Solutions
Automated ETL Testing with Py.Test Kevin A. Smith Senior QA Automation Engineer Cambia Health Solutions 2 Agenda Overview Testing Data Quality Design for Automation & Testability Python and Py.Test Examples
CPE111 COMPUTER EXPLORATION
CPE111 COMPUTER EXPLORATION BUILDING A WEB SERVER ASSIGNMENT You will create your own web application on your local web server in your newly installed Ubuntu Desktop on Oracle VM VirtualBox. This is a
TimesTen Auditing Using ttaudit.java
TimesTen Auditing Using ttaudit.java Installation, Operation, and Configuration As of: TimesTen 11.2.2.6 and ttaudit 1.0.0.15 March, 2014 The ttaudit.java application is free, open source project software
CPSC 3375 Final Project ER Diagram
Relationship Diagram for Final Project: Name UserName Password Phone PortfolioID Portfolios 1,1) Maintain 0,M) Customers Address 0,M) Maintained by CustomerID Name QuantityTraded CostPerShare Are Contained
How To Use Postgresql With Foreign Data In A Foreign Server In A Multi Threaded Database (Postgres)
PostgreSQL at the centre of your dataverse! PGBR 2011! Presented by Dave Page! 3 rd November 2011! EnterpriseDB, Postgres Plus and Dynatune are trademarks of EnterpriseDB Corporation. Other names may be
Geodatabase Programming with SQL
DevSummit DC February 11, 2015 Washington, DC Geodatabase Programming with SQL Craig Gillgrass Assumptions Basic knowledge of SQL and relational databases Basic knowledge of the Geodatabase We ll hold
Advanced Tornado TWENTYONE. 21.1 Advanced Tornado. 21.2 Accessing MySQL from Python LAB
21.1 Advanced Tornado Advanced Tornado One of the main reasons we might want to use a web framework like Tornado is that they hide a lot of the boilerplate stuff that we don t really care about, like escaping
SQL Server 2005. Introduction to SQL Server 2005. SQL Server 2005 basic tools. SQL Server Configuration Manager. SQL Server services management
Database and data mining group, SQL Server 2005 Introduction to SQL Server 2005 Introduction to SQL Server 2005-1 Database and data mining group, SQL Server 2005 basic tools SQL Server Configuration Manager
Lab 2: PostgreSQL Tutorial II: Command Line
Lab 2: PostgreSQL Tutorial II: Command Line In the lab 1, we learned how to use PostgreSQL through the graphic interface, pgadmin. However, PostgreSQL may not be used through a graphical interface. This
Using Python, Django and MySQL in a Database Course
Using Python, Django and MySQL in a Database Course Thomas B. Gendreau Computer Science Department University of Wisconsin - La Crosse La Crosse, WI 54601 [email protected] Abstract Software applications
Maintaining Stored Procedures in Database Application
Maintaining Stored Procedures in Database Application Santosh Kakade 1, Rohan Thakare 2, Bhushan Sapare 3, Dr. B.B. Meshram 4 Computer Department VJTI, Mumbai 1,2,3. Head of Computer Department VJTI, Mumbai
1. What is SQL Injection?
SQL Injection 1. What is SQL Injection?...2 2. Forms of vulnerability...3 2.1. Incorrectly filtered escape characters...3 2.2. Incorrect type handling...3 2.3. Vulnerabilities inside the database server...4
Using SAS ACCESS to retrieve and store data in relational database management systems
Using SAS ACCESS to retrieve and store data in relational database management systems Department of Biology Dalhousie University SHRUG meeting, February 23rd 2007 Disclaimer Background SAS is the only
Serious Threat. Targets for Attack. Characterization of Attack. SQL Injection 4/9/2010 COMP620 1. On August 17, 2009, the United States Justice
Serious Threat SQL Injection COMP620 On August 17, 2009, the United States Justice Department tcharged an American citizen Albert Gonzalez and two unnamed Russians with the theft of 130 million credit
Monitoring Agent for PostgreSQL 1.0.0 Fix Pack 10. Reference IBM
Monitoring Agent for PostgreSQL 1.0.0 Fix Pack 10 Reference IBM Monitoring Agent for PostgreSQL 1.0.0 Fix Pack 10 Reference IBM Note Before using this information and the product it supports, read the
In This Lecture. Security and Integrity. Database Security. DBMS Security Support. Privileges in SQL. Permissions and Privilege.
In This Lecture Database Systems Lecture 14 Natasha Alechina Database Security Aspects of security Access to databases Privileges and views Database Integrity View updating, Integrity constraints For more
Relational Databases. Charles Severance
Relational Databases Charles Severance Relational Databases Relational databases model data by storing rows and columns in tables. The power of the relational database lies in its ability to efficiently
ULTEO OPEN VIRTUAL DESKTOP V4.0
ULTEO OPEN VIRTUAL DESKTOP V4.0 MIGRATION GUIDE 28 February 2014 Contents Section 1 Introduction... 4 Section 2 Overview... 5 Section 3 Preparation... 6 3.1 Enter Maintenance Mode... 6 3.2 Backup The OVD
SQL Injection. Slides thanks to Prof. Shmatikov at UT Austin
SQL Injection Slides thanks to Prof. Shmatikov at UT Austin Dynamic Web Application GET / HTTP/1.0 Browser HTTP/1.1 200 OK Web server index.php Database server slide 2 PHP: Hypertext Preprocessor Server
LSINF1124 Projet de programmation
LSINF1124 Projet de programmation Database Programming with Java TM Sébastien Combéfis University of Louvain (UCLouvain) Louvain School of Engineering (EPL) March 1, 2011 Introduction A database is a collection
A table is a collection of related data entries and it consists of columns and rows.
CST 250 MySQL Notes (Source: www.w3schools.com) MySQL is the most popular open-source database system. What is MySQL? MySQL is a database. The data in MySQL is stored in database objects called tables.
Python and MongoDB. Why?
Python and MongoDB Kevin Swingler Why? Python is becoming the scripting language of choice in big data It has a library for connecting to a MongoDB: PyMongo Nice mapping betwenpython data structures and
Java and Databases. COMP514 Distributed Information Systems. Java Database Connectivity. Standards and utilities. Java and Databases
Java and Databases COMP514 Distributed Information Systems Java Database Connectivity One of the problems in writing Java, C, C++,, applications is that the programming languages cannot provide persistence
Copying data from SQL Server database to an Oracle Schema. White Paper
Copying data from SQL Server database to an Oracle Schema White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information
CS346: Database Programming. http://warwick.ac.uk/cs346
CS346: Database Programming http://warwick.ac.uk/cs346 1 Database programming Issue: inclusionofdatabasestatementsinaprogram combination host language (general-purpose programming language, e.g. Java)
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
Medstrat EMR API. Introduction. Division of Labor API
Medstrat EMR API Introduction Medstrat provides a programming interface for the purpose of integrating its PACS with an EMR. This document describes the division of labor between the EMR and the PACS as
An Interface from YAWL to OpenERP
An Interface from YAWL to OpenERP Joerg Evermann Faculty of Business Administration, Memorial University of Newfoundland, Canada [email protected] Abstract. The paper describes an interface from the YAWL
Oracle Database 10g Express
Oracle Database 10g Express This tutorial prepares the Oracle Database 10g Express Edition Developer to perform common development and administrative tasks of Oracle Database 10g Express Edition. Objectives
Databases and SQL. The Bioinformatics Lab SS 2013 - Wiki topic 10. Tikira Temu. 04. June 2013
Databases and SQL The Bioinformatics Lab SS 2013 - Wiki topic 10 Tikira Temu 04. June 2013 Outline 1 Database system (DBS) Definition DBS Definition DBMS Advantages of a DBMS Famous DBMS 2 Some facts about
What is ODBC? Database Connectivity ODBC, JDBC and SQLJ. ODBC Architecture. More on ODBC. JDBC vs ODBC. What is JDBC?
What is ODBC? Database Connectivity ODBC, JDBC and SQLJ CS2312 ODBC is (Open Database Connectivity): A standard or open application programming interface (API) for accessing a database. SQL Access Group,
Darshan Institute of Engineering & Technology PL_SQL
Explain the advantages of PL/SQL. Advantages of PL/SQL Block structure: PL/SQL consist of block of code, which can be nested within each other. Each block forms a unit of a task or a logical module. PL/SQL
Managing rights in PostgreSQL
Table des matières Managing rights in PostgreSQL...3 1 The author...3 2 Introduction...4 3 Users, groups and roles...4 3.1 Users and groups...5 3.2 Modifying a role...5 4 Special roles and role attributes...5
SQL Injection. SQL Injection. CSCI 4971 Secure Software Principles. Rensselaer Polytechnic Institute. Spring 2010 ...
SQL Injection CSCI 4971 Secure Software Principles Rensselaer Polytechnic Institute Spring 2010 A Beginner s Example A hypothetical web application $result = mysql_query(
Open Object Developer Book
Open Object Developer Book Release 1.0 Tiny SPRL 2009-04-10 CONTENTS i ii I Forewords 5 1 Introduction 7 2 Who is this book for? 9 3 Content of the book 11 4 About the author(s) 13 II Part 1 : Getting
dbext for Vim David Fishburn h5p://www.vim.org/scripts/script.php?script_id=356
dbext for Vim David Fishburn h5p://www.vim.org/scripts/script.php?script_id=356 dbext Database extension Database agnositc Allows you to execute SQL and query databases without having to leave your editor
Integration of Nagios monitoring tools with IBM's solutions
Integration of Nagios monitoring tools with IBM's solutions Wojciech Kocjan IBM Corporation [email protected] 1 Agenda Introduction Integration bottlenecks Why open standards? CIM and WBEM Open
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Exposed Database( SQL Server) Error messages Delicious food for Hackers
Exposed Database( SQL Server) Error messages Delicious food for Hackers The default.asp behavior of IIS server is to return a descriptive error message from the application. By attacking the web application
Archive Server for MDaemon disaster recovery & database migration
Archive Server for MDaemon Archive Server for MDaemon disaster recovery & database migration Abstract... 2 Scenarios... 3 1 - Reinstalling ASM after a crash... 3 Version 2.2.0 or later...3 Versions earlier
SQL Server. 2012 for developers. murach's TRAINING & REFERENCE. Bryan Syverson. Mike Murach & Associates, Inc. Joel Murach
TRAINING & REFERENCE murach's SQL Server 2012 for developers Bryan Syverson Joel Murach Mike Murach & Associates, Inc. 4340 N. Knoll Ave. Fresno, CA 93722 www.murach.com [email protected] Expanded
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Chapter 9 Java and SQL. Wang Yang [email protected]
Chapter 9 Java and SQL Wang Yang [email protected] Outline Concern Data - File & IO vs. Database &SQL Database & SQL How Connect Java to SQL - Java Model for Database Java Database Connectivity (JDBC)
Client Side Cross Site Scripting
Client Side Cross Site Scripting 1 Client Side Cross Site Scripting CLIENT SIDE XSS - DI PAOLA 2 Soluzioni e sicurezza per applicazioni mobile e payments Consorzio Triveneto, azienda leader nei sistemi
SalesJunction.com. Sales Force Automation & CRM. SJAPI Guide
SalesJunction.com Sales Force Automation & CRM SJAPI Guide Table of Contents API Essentials 2 AddAcct.asp 2 AddAct.asp 3 AddCont.asp 3 AddOpp.asp 4 FindContacts.asp 4 FindContacts_ViaEmail.asp 5 GetAcct.asp
IVR Security:- Internal A3acks Via Phone Line
IVR Security:- Internal A3acks Via Phone Line Who am I? Rahul Sasi Security Researcher @ isight Partners. Member Garage4Hackers. Garage 4 Hackers InformaGon Security professionals from Fortune 500, Security
Installation and configuration op5 Oracle Extension
Installation and configuration op5 Oracle Extension Installation and configuration op5 Oracle Extension Version 1 Rev 1 Installation and configuration op5 Oracle Extension Version 1, Rev 1 Author: op5
How-To: MySQL as a linked server in MS SQL Server
How-To: MySQL as a linked server in MS SQL Server 1 Introduction... 2 2 Why do I want to do this?... 3 3 How?... 4 3.1 Step 1: Create table in SQL Server... 4 3.2 Step 2: Create an identical table in MySQL...
"SQL Database Professional " module PRINTED MANUAL
"SQL Database Professional " module PRINTED MANUAL "SQL Database Professional " module All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or
A Brief Introduction to MySQL
A Brief Introduction to MySQL by Derek Schuurman Introduction to Databases A database is a structured collection of logically related data. One common type of database is the relational database, a term
Accessing External Databases from Mobile Applications
CENTER FOR CONVERGENCE AND EMERGING NETWORK TECHNOLOGIES CCENT Syracuse University TECHNICAL REPORT: T.R. 2014-003 Accessing External Databases from Mobile Applications Version 2.0 Authored by: Anirudh
An extension to DBAPI 2.0 for easier SQL queries
An extension to DBAPI 2.0 for easier SQL queries Martin Blais EWT LLC / Madison Tyler http://furius.ca/antiorm/ Introduction connection = dbapi.connect(...) cursor = connection.cursor() SELECT * FROM Users
Programming in postgresql with PL/pgSQL. Procedural Language extension to postgresql
Programming in postgresql with PL/pgSQL Procedural Language extension to postgresql 1 Why a Programming Language? Some calculations cannot be made within a query (examples?) Two options: Write a program
Detecting SQL Injection Vulnerabilities in Web Services
Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web
Application note: SQL@CHIP Connecting the IPC@CHIP to a Database
Application note: SQL@CHIP Connecting the IPC@CHIP to a Database 1. Introduction This application note describes how to connect an IPC@CHIP to a database and exchange data between those. As there are no
Database Driven Websites Using PHP with Informix
Database Driven Websites Using PHP with Informix February 12, 2013 Thomas Beebe Advanced DataTools Corp ([email protected]) Tom Beebe Tom is a Senior Database Consultant and has been with Advanced
DBI-Link: 3.0. PgCon Ottawa 2008 Copyright David Fetter 2008 All Rights Reserved http://fetter.org/
DBI-Link: 3.0 PgCon Ottawa 2008 Copyright David Fetter 2008 All Rights Reserved http://fetter.org/ What's New In 3.0! User-settable Type Mapping (neutral by default) Automatic Predicate Pushing (PostgreSQL
