- This tutorial offers readers a thorough introduction to programming in Python 2.4, the portable, interpreted, object-oriented programming language that combines power with clear syntax
- Beginning programmers will quickly learn to develop robust, reliable, and reusable Python applications for Web development, scientific applications, and system tasks for users or administrators
- Discusses the basics of installing Python as well as the new features of Python release 2.4, which make it easier for users to create scientific and Web applications
- Features examples of various operating systems throughout the book, including Linux, Mac OS X/BSD, and Windows XP
Alex Samuel (San Diego, CA) has developed software for biology researchers and now studies highenergy physics at Caltech. Alex has worked on many GNU/Linux development tools, including GCC, and co-founded CodeSourcery LLC, a consulting firm specializing in GNU/Linux development tools.
David Aitel (NY, NY) is the CEO of Immunity and a coauthor of Shellcoder’s Handbook.
Eric Foster-Johnson (Minneapolis, MN) uses Python extensively with Java, and is a veteran author, most recently completing Beginning Shell Scripting.
Leonard Richardson (San Francisco, CA) writes useful Python packages with silly names.
Jason Diamond (CA) Jason Diamond is a software development instructor for DevelopMentor and a consultant specializing in C++, .NET, Python, and XML. He spends most of his spare time contributing to open-source projects using his favorite language, Python.
Aleathea Parker (San Francisco CA) is a programmer working as a publication engineer for a major software company, coding primarily in Python and XSLT. She has a background in web applications and content management.
Michael Roberts (Puerto Rico) has been programming professionally in C, Perl, and Python for long enough that Python didn’t actually exist when he started. He is the chief perpetrator of the wftk open-source workflow toolkit, and he swears that it will someday be finished, for certain values of “finished”.
Table of Contents
Chapter 1: Programming Basics and Strings.
Chapter 2: Numbers and Operators.
Chapter 3: Variables—Names for Values.
Chapter 4: Making Decisions.
Chapter 5: Functions.
Chapter 6: Classes and Objects.
Chapter 7: Organizing Programs.
Chapter 8: Files and Directories.
Chapter 9: Other Features of the Language.
Chapter 10: Building a Module.
Chapter 11: Text Processing.
Chapter 12: Testing.
Chapter 13: Writing a GUI with Python.
Chapter 14: Accessing Databases.
Chapter 15: Using Python for XML.
Chapter 16: Network Programming.
Chapter 17: Extension Programming with C.
Chapter 18: Writing Shareware and Commercial Programs.
Chapter 19: Numerical Programming.
Chapter 20: Python in the Enterprise.
Chapter 21: Web Applications and Web Services.
Chapter 22: Integrating Java with Python.
Appendix A: Answers to Exercises.
Appendix B: Online Resources.
Appendix C: What’s New in Python 2.4.
Sign up now »
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
- FTTechnical Business AnalystNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia