Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ant Developer's Handbook

Buy
Ant Developer's Handbook, 9780672324260 (0672324261), Sams Publishing, 2002
Ant has emerged as the preferred building tool for Java developers, automating tedious compilation, test, and code management. Many Java developers are aware of Ant but there is little documentation to assist in getting started with the Ant tool. Even experienced developers who already use some of the features of the Ant tool, struggle with the more advanced aspects. This book will educate those devlopers in these more advanced topics, and help them get more out of the tool. The Ant Developer's Handbook begins with a rapid introduction to obtaining, installing, and configuring Ant and covers all major feature sets and use practices.

Ant is a cross-platform build and configuration management tool. It is written in Java, and uses XML as its file format, thereby allowing entire development teams to share Ant build files, regardless of the operating system each developer is using. Ant can perform nearly any common configuration management function, including:

  • compiling application source code.
  • running test suites and building archive files.
  • moving/copying files to server machines.
  • interacting with source control systems.
Configuration Management (CM) continues to remain a significant difficulty in the software development arena. This has been particularly evident with Java. As project teams mature and realize that they need CM, the have been turning to Ant as a tool fill their CM needs. Ant Developer's Handbook is important as it addresses the "how to" gap that is currently not covered by any other set of documentation. This "how to" information will be important for these teams as they attempt to use Ant in industrially sized environments.
(HTML tags aren't allowed.)

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Effective Functional Verification: Principles and Processes
Effective Functional Verification: Principles and Processes
Effective Functional Verification is organized into 4 parts. The first part contains 3 chapters designed appeal to newcomers and experienced people to the field. There is a survey of various verification methodologies and a discussion of them.

The second part with 3 chapters is targeted towards people in management and...

Biological and Bioenvironmental Heat and Mass Transfer (Food Science and Technology)
Biological and Bioenvironmental Heat and Mass Transfer (Food Science and Technology)
Providing a solid foundation in, and systematic treatment of, heat and mass transport, Biological and Bioenvironmental Heat and Mass Transfer covers engineering principles of heat and mass transfer. The author discusses biological content, context, and parameter regimes and supplies practical applications for biological and...

NHibernate 2.x Beginner's Guide
NHibernate 2.x Beginner's Guide

NHibernate is an open source object-relational mapper, or simply put, a way to retrieve data from your database into standard .NET objects. Quite often we spend hours designing the database, only to go back and re-design a mechanism to access that data and then optimize that mechanism. This book will save you time on your project, providing...

Managing in the Email Office (Computer Weekly Professional)
Managing in the Email Office (Computer Weekly Professional)
Managing the Email Office is for all people who feel email is taking over their lives. It provides practical help and guidance on how to manage both their own volume of email as well as their organization's. It will enable you to develop winning ways with email and to re-claim some of those valuable resources which email...
sendmail Performance Tuning
sendmail Performance Tuning

"This book is great. Nick covers a wide range of materials--everything from how to architect the mail system and what disks to buy to how to configure your router. This book should be a basic reference for anyone who needs to get down into the guts of a sendmail-based system and make it shine."-Eric Allman, the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy