Flylib.com
Learning XSLT
Learning XSLT
ISBN: 0596003277
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Michael James Fitzgerald
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Who Should Read This Book?
About the Examples
XSLT and XPath Reference
How This Book Is Organized
Conventions Used in This Book
Using Examples
Comments and Questions
Acknowledgments
Chapter 1. Transforming Documents with XSLT
1.1 How XSLT Works
1.2 Using Client-Side XSLT in a Browser
1.3 Using apply-templates
1.4 Summary
Chapter 2. Building New Documents with XSLT
2.1 Outputting Text
2.2 Literal Result Elements
2.3 Using the Element Called element
2.4 Adding Attributes
2.5 Outputting Comments
2.6 Outputting Processing Instructions
2.7 One Final Example
2.8 Summary
Chapter 3. Controlling Output
3.1 The Output Method
3.2 Outputting XML
3.3 Outputting HTML
3.4 Outputting Text
3.5 Using a QName Output Method
3.6 Media Types
3.7 Summary
Chapter 4. Traversing the Tree
4.1 The XPath Data Model
4.2 Location Paths
4.3 Expressions
4.4 What Is a Pattern?
4.5 Predicates
4.6 Axes
4.7 Name and Node Tests
4.8 Doing the Math with Expressions
4.9 Summary
Chapter 5. XPath and XSLT Functions
5.1 Boolean Functions
5.2 Node-Set Functions
5.3 Number Functions
5.4 String Functions
5.5 Summary
Chapter 6. Copying Nodes
6.1 The copy Element
6.2 The copy-of Element
6.3 Copying Nodes from Two Documents
6.4 Summary
Chapter 7. Using Variables and Parameters
7.1 Defining Variables and Parameters
7.2 Using Variables
7.3 Using Parameters
7.4 Invoking Templates with Parameters
7.5 Using Result Tree Fragments
7.6 Summary
Chapter 8. Sorting Things Out
8.1 Simple Ascending Sort
8.2 Reversing the Sort
8.3 By the Numbers
8.4 Multiple Sorts
8.5 The lang and case-order Attributes
8.6 Summary
Chapter 9. Numbering Lists
9.1 Numbered Lists
9.2 Alphabetical Lists
9.3 Roman Numerals
9.4 Inserting an Individual Formatted Value
9.5 Numbering Levels
9.6 The from Attribute
9.7 The lang and letter-value Attributes
9.8 More Help with Formatted Numbers
9.9 Summary
Chapter 10. Templates
10.1 Template Priority
10.2 Calling a Named Template
10.3 Using Templates with Parameters
10.4 Modes
10.5 Built-in Template Rules
10.6 Summary
Chapter 11. Using Keys
11.1 A Simple Key
11.2 More Than One Key
11.3 Using a Parameter with Keys
11.4 Cross-Referencing with Keys
11.5 Grouping with Keys
11.6 Summary
Chapter 12. Conditional Processing
12.1 The if Element
12.2 The choose and when Elements
12.3 Summary
Chapter 13. Working with Multiple Documents
13.1 Including Stylesheets
13.2 Importing Stylesheets
13.3 Using the document( ) Function
13.4 Summary
Chapter 14. Alternative Stylesheets
14.1 A Literal Result Element Stylesheet
14.2 An Embedded Stylesheet
14.3 Aliasing a Namespace
14.4 Excluding Namespaces
14.5 Summary
Chapter 15. Extensions
15.1 Xalan, Saxon, and EXSLT Extensions
15.2 Using a Saxon Extension Attribute
15.3 Result Tree Fragment to Node-Set
15.4 Using EXSLT
15.5 Fallback Behavior
15.6 Checking for Extension Availability
15.7 Summary
Chapter 16. XSLT 2.0 and XPath 2.0
16.1 New XSLT 2.0 Features
16.2 New XPath 2.0 Features
16.3 Multiple Result Trees
16.4 Using Regular Expressions
16.5 Grouping in XSLT 2.0
16.6 Extension Functions
16.7 Summary
Chapter 17. Writing an XSLT ProcessorInterface
17.1 Running an XSLT Processor from Java
17.2 Writing an XSLT Processor with C
17.3 Summary
Chapter 18. Parting Words
18.1 The Ox Documentation Tool
18.2 Signing Off
Appendix A. XSLT Processors
A.1 Installing and Running XSLT Processors
A.2 Using jd.xslt
Glossary
Colophon
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Learning XSLT
ISBN: 0596003277
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Michael James Fitzgerald
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.4 How to Generate a Key Using PuTTY
Step 5.1 General Troubleshooting
Image Processing with LabVIEW and IMAQ Vision
NI Vision Builder for Automated Inspection
Video Standards
Compression Techniques
Morphology Functions
Application Examples
MySQL Clustering
Startup Phases
Storage Nodes
MySQL Clusters Native Backup Tool
Performance Metrics
Web Farm/MySQL Farm
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Data Flow
Windows Internet Name Service (WINS)
Internet Information Services (IIS) and the Internet Protocols
Internet Protocol Security (IPSec)
Programming Microsoft ASP.NET 3.5
The ADO.NET Object Model
Paging Through Data Sources
ASP.NET Iterative Controls
ASP.NET Security
Data-Bound and Templated Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies