Flylib.com
List of Listings
Previous page
Table of content
Team-Fly
Chapter 2: Building MIDlets
Listing 2-1: Jargoneer's source code.
Chapter 6: Lists and Forms
Listing 6-1: The TravelList source code.
Chapter 7: Persistent Storage
Listing 7-1: Source code for RecordMIDlet.
Listing 7-2: Preferences is a helper class that encapsulates RecordStore access.
Chapter 8: Connecting to the World
Listing 8-1: This MIDlet retrieves an image from the Internet.
Listing 8-2: CookieMIDlet saves a server session ID cookie.
Chapter 9: Programming a Game Interface
Listing 9-1: Having fun with fonts.
Chapter 12: Protecting Network Data
Listing 12-1: PasswordMIDlet, a protected password client.
Listing 12-2: The HexCodec helper class.
Listing 12-3: The URLBuilder helper class.
Listing 12-4: The PasswordServlet class.
Listing 12-5: StealthMIDlet, a data encryption MIDlet.
Listing 12-6: The source code for StealthServlet.
Team-Fly
Previous page
Table of content
ColdFusion MX Professional Projects
ISBN: 1590590775
EAN: 2147483647
Year: 2000
Pages: 129
Authors:
Rohit Kochar
,
Parag Rastogi
BUY ON AMAZON
WebLogic: The Definitive Guide
Software and Versions
Using WebLogics RMI over IIOP
Using CMP and EJB QL
Monitoring Clusters
Performance, Monitoring, and Tuning
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Test Implementation
Test Execution
The Software Tester
Improving the Testing Process
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Team change
Organizational change
Leading change
Restructuring
IT-based process change
Special Edition Using Crystal Reports 10
Working with Groups
Designing Effective Report Templates
Why Implement the Crystal Repository?
Crystal Reports Semantic Layer Business Views
Troubleshooting
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
The Ethics of Persuasive Technology
Captology Looking Forward
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Triggers
Indirect Privilege Escalation
Attacking Oracle PL/SQL Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies