Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Java Networking

Buy
Advanced Java Networking, 9780137491360 (0137491360), Prentice Hall, 1997
Advanced Java Networking gives the reader a well-rounded and fairly detailed introduction to Java networking technologies. The subjects Sridharan covers sound like a seminar list from a software development conference: IDL/CORBA, RMI, JDBC/SQL, JavaBeans, Castanet, JMAPI, servlets, and JavaOS, to name a few. But this isn't a dilettantish cursory look at each of many technologies. Rather, this book provides the programmer with the kind of information needed to make solid design and implementation decisions. In the chapter on RMI, for example, Sridharan spends a little time explaining the attractions and shortcomings of the specification. Then, while walking you through the creation of a calendaring application, shows you some of the ins and outs of actual program design with RMI.

All of these features are in addition to the excellent treatment of general advanced Java stuff you'll want to understand thoroughly before you plunge into the really hairy stuff.

This book is ideal for knowledgeable programmers who are trying to decide how to attack a problem. You might need to use another book for further details on your solution of choice, but this is a fine place to start.
(HTML tags aren't allowed.)

Palm webOS
Palm webOS

This is the official guide to building native JavaScript applications for Palm's new mobile operating system, Palm® webOS™. Written by Palm's software chief technology officer along with the Palm webOS development team, Palm webOS provides a complete tutorial on the design principles, architecture, UI, tools, and...

Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Sams Teach Yourself Word 2003 in 24 Hours
Sams Teach Yourself Word 2003 in 24 Hours
For readers who are new to Word 2003 and want to get up and running quickly, Sams Teach Yourself Microsoft Word 2003 in 24 Hours will do the trick. This book includes shortcuts and ways to accomplish the most common tasks in Word. Readers are able to work at their own pace through the easily digestible, one-hour...

A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems
A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems

The recent remarkable developments of interior point algorithms began in 1984 with Karmarkar's polynomial-time interior point algorithm for linear programs using a log- arithmic potential function and a projective transformation. The progress has been made so rapidly and extensively that it seems difficult to get a comprehensive...

Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Destroying the Village
Destroying the Village

Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy threatening to end your national existence was right, natural, and necessary. In the wake of World War Two this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the notion of just...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy