You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This authoritative Java security book is written by the architect of the Java security model. It chronicles J2EE v1.4 security model enhancements that will allow developers to build safer, more reliable, and more impenetrable programs.
Java Message Service (JMS) represents a powerful solution for communicating between Java enterprise applications, software components, and legacy systems. In this authoritative tutorial and comprehensive reference, Sun's Java Message Service architects offer start-to-finish coverage of peer-to-peer JMS development with Java 2 Platform, Enterprise Edition, Release 1.3. JMS is now fully integrated into the J2EE platform -- and this is the first book to show how to make the most of JMS in the context of sophisticated J2EE application development. The authors begin by introducing the JMS API to developers who are new to it. Then, with the help of extensive programming examples, they demonstrate key JMS techniques for enabling applications to create, send, receive, and read messages, and for integrating with existing back office and enterprise systems. Coverage includes: consuming messages asynchronously with message-driven beans; producing messages from application clients; accessing entity beans from message-driven bean; producing messages from session beans; and much more. For all Java developers building applications that must communicate and share information.
Software -- Programming Languages.
Following her widely acclaimedAutobiography of Red("A spellbinding achievement" --Susan Sontag), a new collection of poetry and prose that displays Anne Carson's signature mixture of opposites--the classic and the modern, cinema and print, narrative and verse. InMen in the Off Hours, Carson reinvents figures as diverse as Oedipus, Emily Dickinson, and Audubon. She views the writings of Sappho, St. Augustine, and Catullus through a modern lens. She sets up startling juxtapositions (Lazarus among video paraphernalia; Virginia Woolf and Thucydides discussing war). And in a final prose poem, she meditates on the recent death of her mother. With its quiet, acute spirituality, its fearless wit and sensuality, and its joyful understanding that "the fact of the matter for humans is imperfection,"Men in the Off Hoursshows us "the most exciting poet writing in English today" (Michael Ondaatje) at her best. From the Hardcover edition.
Annotation "This book is a guide to developing applications with Java Card technology. It introduces you to the Java Card platform and features discussions of programming concepts. It also provides a step-by-step Java Card applet development guide to get you up and running." "Specific topics covered include: smart card basics; Java Card virtual machine; persistent and transient objects; atomicity and transactions; handling APDUs; applet firewall and object sharing; Java Card platform security; a step-by-step applet development guide; applet optimization guidelines; and a comprehensive reference to Java Card APIs."--BOOK JACKET. Title Summary field provided by Blackwell North America, Inc. All Rights Reserved.
For nearly five years, one book has served as the definitive reference to Java for all serious developers: The Java Language Specification, by James Gosling, Bill Joy, and Guy Steele. Now, these world-renowned Java authorities (along with new co-author Gilad Bracha) have delivered a monumental update. This completely revised Second Edition covers the Java 2 Platform Standard Edition Version 1.3 with unprecedented depth and precision, offering the invaluable insights of Java's creators to every developer. There is no better source for learning everything about the Syntax and Semantics of the Java programming language. Developers will turn to this book again and again.
Annotation "JavaSpaces technology is a powerful Jini service from Sun Microsystems, Inc. that facilitates building distributed applications. The JavaSpaces model provides persistent object exchange "areas" in which remote Java processes can coordinate their actions and exchange data. JavaSpaces technology supplies a necessary, cross-platform framework for distributed computing with Jini technology." "This book introduces the JavaSpaces technology architecture and provides a comprehensive description of the model. Using an example-driven approach, this book shows you how to use JavaSpaces technology to develop distributed computing applications." "JavaSpaces Principles, Patterns, and Practice also includes two full-scale applications - one collaborative and the other parallel - that demonstrate how to put the JavaSpaces model to work."--BOOK JACKET. Title Summary field provided by Blackwell North America, Inc. All Rights Reserved.
The Java Native Interface (JNI) enables the integration of code written in the Java programming language with code written in other languages such as C and C++. It allows programmers to take full advantage of the Java platform without having to abandon their investment in legacy code. This book is the definitive resource and a comprehensive guide to working with the JNI. Entirely up-to-date, the book offers a tutorial, a detailed description of JNI features and programming techniques, JNI design justifications, and the official specification for all JNI types and functions. You will find coverage of important topics such as: Writing native methods Passing data types between the Java language and native programming languages Embedding a Java virtual machine implementation in native applications Leveraging legacy native libraries Improving the efficiency and reliability of your code An entire chapter is devoted to avoiding common traps and pitfalls. The book uses numerous examples to illustrate programming techniques that have proven to be effective. 0201325772B04062001
Rae knew a good deal about Richard Ashton. Sharing his sister Judy’s flat, she had lived for a year with his photograph: a dark, handsome, somewhat commanding young man. She had listened to long extracts from his letters, and built up a picturesque if inaccurate picture of his life in Kenya. She knew he declared himself heart-whole, and had instructed his sister to find him a wife. Judy was enthusiastic. As for Rae, at least this promised to be an unusually interesting encounter.
bull; Provides a key overview and introduction to J2ME and two vital J2ME technologies - Mobile Information Device Profile (MIDP) 2.0 and Connected Limited Device Configuration (CDLC) bull; Shows how to build, develop, and code J2ME Applications, how to understand the Game Profile API and the latest J2ME security enhancements bull; Written by the architects of the Java 2 Micro Edition platform