Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 2 Bible

Buy
Java 2 Bible, 9780764508820 (0764508822), John Wiley & Sons, 2002
Welcome to Java 2 Enterprise Edition Bible. This book, which is a follow−up to Java 2 Bible, is for readers
who wish to know more about the enterprise market. Enterprise programming is a hot topic these days, as
more and more companies decide they need an online presence to complement their existing
bricks−and−mortar version. This online presence is more than just a couple of Web pages; it extends to a
complete electronic catalogue and purchasing system.

XML is one of the biggest drivers of the enterprise market. As companies are starting to realize they need to
work together to smooth out the supply−chain management, they are building their second− or
third−generation systems. They are doing this in collaboration with their suppliers and partners. To build these
systems they need interoperability, and whole industries are springing up around this need alone. Need to add
a new partner or supplier? Just ask for the XML DTD. Very quickly you can now include the new
functionality in your system.

Throughout this book we will reference various commercial sites that you will be familiar with as examples of
how large−scale businesses are integrating not only their own Web sites, but also those of partners and
suppliers, into one single system. Order your computer from Dell and you can track it through every stage of
the build process. Then, once it has hit the courier, you can use the Dell site to trace the courier's information
about its progress. Dell doesn't use just one courier, either — yet your experience is identical regardless of
which one is used.

About the Author
Justin Couch spends most of his time in Australia but travels extensively in the United States and England as a trainer and consultant. He is the author of Java 2 Bible (Hungry Minds) and Java 2 Networking (McGraw-Hill).

Daniel H. Steinberg is from Oberlin, Ohio where he is a Mathematics Professor at Oberlin College. He is coauthor of Java 2 Bible and editor of IBM's developerWorks JavaZone.

(HTML tags aren't allowed.)

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

iPad Enterprise Application Development BluePrints
iPad Enterprise Application Development BluePrints

With the release of the iPad and the iOS 5, this latest release comes packed with some great new features and improvements to the various frameworks and contains over 1,500 new APIs. You will learn how to integrate iCloud storage and how to go about using the Facebook and the OpenGraph APIs, as well as applying the various image and...

Software Specification Methods
Software Specification Methods
This book is an introduction to a set of software specification methods. Its targeted audience are readers who do not wish to read pages of definitions in order to understand the basics of a method. The same case study is used to introduce each method, following a rigorously uniform presentation format. Special care has been devoted to ensure that...

Enterprise Application Development with Ext JS and Spring
Enterprise Application Development with Ext JS and Spring

Designed for intermediate developers, this superb tutorial will lead you step by step through the process of developing enterprise web applications combining two leading-edge frameworks. Take a big leap forward in easy stages.

Overview

  • Embark on the exciting journey through the entire enterprise web...
Mastering Network Security
Mastering Network Security
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or...
MacBook Pro Portable Genius
MacBook Pro Portable Genius
You have the world’s top-of-line laptop, and now you want to know how to get the most from it. MacBook Pro Portable Genius is here to give you the best tips and tricks for taking your MacBook Pro to its full potential. Learn to add more data storage, set up a network, communicate effectively with iChat, run Windows applications on...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy