Key Java - advanced tips and techniques

نویسندگان

  • Alex MacManus
  • John Hunt
چکیده

Key Java: Advanced Tips and Techniques #331 pages #Springer Science & Business Media, 1998 #John Hunt, Alexander G. McManus #3540762590, 9783540762591 #1998 Java is such a rapidly evolving language, it can be difficult for developers to keep abreast of developments. It has moved beyond a lnaguage used just for creating Web-based applets to one that is being used for developing serious applications. Key Java is intended for those who already know the Java language, the classes and the tools, but who want to get more out of Java. They are wanting to know about subjects such as good Java style for reusable components, about using Java beans, about the JDBC, about optimising their code, about testing their code appropriately and about using the IFC, tools and the new JFC. This book explores some of the more significant and exciting developments in Java. It covers techniques that will be fundamental to programmers developing significant applications in Java. Each of the self-contained chapters looks beyond the mechanics of coding applications and explores the concepts that will prove vital to getting the most out of the Java language. PDF DOWNLOAD http://relevantin.org/2fjQ5Gg.pdf

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classroom management Techniques: Tips for managing classroom

Introduction: Classroom management includes teacher’s actions to discipline, motivate and engage learners in learning process. If the instructor could not manage the class using classroom management techniques, his or her teaching process would not go well. The aim of this study was to review classroom management techniques. Methods: The databases of SID, Iranmedex, Irondoc, Magiran, Pubmed, Er...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Visual Programming: Tips and Techniques 3/4 Using VisualAge for Java

This talk provides an insight into a variety of approaches to using visual programming tools. The talk introduces techniques that assist in the production of well designed, visually programmed software systems. Visual programming tools are very powerful but offer many paths that allow for the production of software that is difficult to maintain and interpret. The techniques introduced in this t...

متن کامل

Advanced obfuscation techniques for Java bytecode

There exist several obfuscation tools for preventing Java bytecode from being decompiled. Most of these tools simply scramble the names of the identifiers stored in a bytecode by substituting the identifiers with meaningless names. However, the scrambling technique cannot deter a determined cracker very long. We propose several advanced obfuscation techniques that make Java bytecode impossible ...

متن کامل

CJC: An Extensible Checker for the CleanJava Annotation Language

CleanJava is a formal annotation language for the Java programming language to support a Cleanroom-style functional program verification technique that views programs as mathematical functions. It needs a suite of support tools including a checker that can parse annotations and check them for syntactic and static semantic correctness. The two key requirements of the checker are flexibility and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998