Flylib.com
List of Listings
Previous page
Table of content
Chapter 2: Creating a Port Information Application
Listing 2-1: The PortDescription.java File
Listing 2-2: The ShowDescriptionWindow.java File
Chapter 3: Creating the Modem Dialer Application
Listing 3-1: The PortModem.java File
Listing 3-2: The PortChooser.java File
Chapter 4: Creating a Printing Application
Listing 4-1: The CommPrinting.java File
Listing 4-2: The PortChoice.java File
Listing 4-3: The ColorChoose.java File
Listing 4-4: The FontChoose.java File
Listing 4-5: The PrintComponent_Class.java File
Chapter 5: Creating a Serial Communication Application
Listing 5-1: The PortCommunication.java File
Listing 5-2: The PortPropertyPage.java File
Chapter 6: Creating a Fax Application
Listing 6-1: The PortFax.java File
Listing 6-2: The PreparedFaxDoc.java File
Listing 6-3: The ConvertIntoTextImage.java File
Listing 6-4: The ConvertIntoHTML.java File
Listing 6-5: The FaxPropertyPage.java File
Listing 6-6: The FaxStatusListener.java File
Listing 6-7: The ModemCapabilities.java File
Listing 6-8: The ImageToFaxEncoder.java File
Listing 6-9: The LCFrame.java File
Listing 6-10: The SendingFax.java File
Previous page
Table of content
Developing Applications Using JCA
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 43
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Apply Your Knowledge
Wireless LANs
Study Strategies
Buffer Overflows
Session Hijacking
Cisco Voice Gateways and Gatekeepers
Circuit Options
Voice Translation Rules and Profiles
Order of Operation in Digit Manipulation
Restricting Inbound Calls
Verifying and Troubleshooting MGCP Gateway Fallback
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Three Sales Process
Chapter Six Defining Pain or Critical Business Issue
Chapter Seven Diagnose Before You Prescribe
Chapter Ten Vision Re-engineering
Appendix A Value Justification Example
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Cisco Secure IDS
NFR Security
Data Correlation
Incident Response
Laws, Standards, and Organizations
Extending and Embedding PHP
Functional Functions
Summary
Vectors Versus Linked Lists
Filters
Resources/Lists
VBScript in a Nutshell, 2nd Edition
Debugging
Program Flow
The WSH Object Model
Section A.15. String Manipulation
Section B.1. Color Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies