Flylib.com
Building an On Demand Computing Environment with IBM: How to Optimize Your Current Infrastructure for Today and Tomorrow (MaxFacts Guidebook series)
Building an On Demand Computing Environment with IBM: How to Optimize Your Current Infrastructure for Today and Tomorrow (MaxFacts Guidebook series)
ISBN: 193164411X
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
Jim Hoskins
BUY ON AMAZON
Core Java 2 Volume II - Advanced Features, Seventh Edition
Table of Contents
Copyright
List of Code Examples
Preface
To the Reader
About This Book
Conventions
Acknowledgments
Chapter1.Multithreading
What Are Threads?
Interrupting Threads
Thread States
Thread Properties
Synchronization
Blocking Queues
Thread-Safe Collections
Callables and Futures
Executors
Synchronizers
Threads and Swing
Chapter2.Collections
Collection Interfaces
Concrete Collections
The Collections Framework
Algorithms
Legacy Collections
Chapter3.Networking
Connecting to a Server
Implementing Servers
Sending E-Mail
Making URL Connections
Advanced Socket Programming
Chapter4.Database Programming
The Design of JDBC
The Structured Query Language
JDBC Installation
Basic JDBC Programming Concepts
Query Execution
Scrollable and Updatable Result Sets
Metadata
Row Sets
Transactions
Advanced Connection Management
Introduction to LDAP
Chapter5.Distributed Objects
The Roles of Client and Server
Remote Method Invocations
Setup for Remote Method Invocation
Parameter Passing in Remote Methods
Server Object Activation
Java IDL and CORBA
Remote Method Calls with SOAP
Chapter6.Advanced Swing
Lists
Trees
Tables
Styled Text Components
Progress Indicators
Component Organizers
Chapter7.Advanced AWT
The Rendering Pipeline
Shapes
Areas
Strokes
Paint
Coordinate Transformations
Clipping
Transparency and Composition
Rendering Hints
Readers and Writers for Images
Image Manipulation
Printing
The Clipboard
Drag and Drop
Chapter8.JavaBeans Components
Why Beans?
The Bean-Writing Process
Using Beans to Build an Application
Naming Patterns for Bean Properties and Events
Bean Property Types
BeanInfo Classes
Property Editors
Customizers
JavaBeans Persistence
Chapter9.Security
Class Loaders
Bytecode Verification
Security Managers and Permissions
Digital Signatures
Code Signing
Encryption
Chapter10.Internationalization
Locales
Number Formats
Date and Time
Collation
Message Formatting
Text Files and Character Sets
Resource Bundles
A Complete Example
Chapter11.Native Methods
Calling a C Function from the Java Programming Language
Numeric Parameters and Return Values
String Parameters
Accessing Fields
Encoding Signatures
Calling Java Methods
Accessing Array Elements
Handling Errors
Using the Invocation API
A Complete Example: Accessing the Windows Registry
Chapter12.XML
Introducing XML
Parsing an XML Document
Validating XML Documents
Locating Information with XPath
Using Namespaces
Using the SAX Parser
Generating XML Documents
XSL Transformations
Chapter13.Annotations
Addition of Metadata to Programs
An Example: Annotating Event Handlers
Annotation Syntax
Standard Annotations
The apt Tool for Source-Level Annotation Processing
Bytecode Engineering
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Building an On Demand Computing Environment with IBM: How to Optimize Your Current Infrastructure for Today and Tomorrow (MaxFacts Guidebook series)
ISBN: 193164411X
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
Jim Hoskins
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Filtering for Null Values
Adding Records with a GUID Primary Key
Using Transaction Isolation Levels to Protect Data
Binding a Windows DataGrid to Master-Detail Data
Creating DataSet Relationships from SQL Server Relationships
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Basic Graphics Commands
Programming the Keyboard, Mouse, and Joystick
Playing Intro Movies and Cut-Scenes
Multiplayer Programming The Crazy Carnage Game
Appendix A Answers to the Chapter Quizzes
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Initiation of the System Authorization Process
The Certification Phase
The Accreditation Phase
Appendix F Security Control Catalog
C++ How to Program (5th Edition)
if...else Double-Selection Statement
Exercises
protected Members
Stream Input
Closing Remarks
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Making Quantitative Decisions
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
The Oracle Hackers Handbook: Hacking and Defending Oracle
Triggers
Attacking Oracle PL/SQL Web Applications
Accessing the File System
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies