Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Just Java(TM) 2 (6th Edition)

Buy
Just Java(TM) 2 (6th Edition), 9780131482111 (0131482114), Prentice Hall, 2004

The #1 introduction to J2SE 1.5 and enterprise/server-side development!

An international bestseller for eight years, Just Java(TM) 2 is the complete, accessible Java tutorial for working programmers at all levels. Fully updated and revised, this sixth edition is more than an engaging overview of Java 2 Standard Edition (J2SE 1.5) and its libraries: it's also a practical introduction to today's best enterprise and server-side programming techniques. Just Java(TM) 2, Sixth Edition, reflects both J2SE 1.5 and the latest Tomcat and servlet specifications. Extensive new coverage includes:

  • New chapters on generics and enumerated types

  • New coverage of Web services, with practical examples using Google and Amazon Web services

  • Simplified interactive I/O with printf()

  • Autoboxing and unboxing of primitive types

  • Static imports, foreach loop construct, and other new language features

Companion Web Site

All the book's examples and sample programs are available at http://afu.com.

(HTML tags aren't allowed.)

The Cryptoclub: Using Mathematics to Make and Break Secret Codes
The Cryptoclub: Using Mathematics to Make and Break Secret Codes
Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math topics covered...
Quality of Service for Intenet Multimedia
Quality of Service for Intenet Multimedia

Continuous media applications have exceptionally stringent QoS requirements, and QoS for multimedia will remain a challenge well into the future. The solution begins with service-differentiated networks capable of providing appropriate grades of service to each application. This book takes the next step, showing how continuous...

Contemporary Popular Music Studies: Proceedings of the International Association for the Study of Popular Music 2017 (Systematische Musikwissenschaft)
Contemporary Popular Music Studies: Proceedings of the International Association for the Study of Popular Music 2017 (Systematische Musikwissenschaft)

This is the second volume in the series that documents the 19th edition of the biennial conference of the International Association for the Study of Popular Music. The volume contains contributions on the variety of musical genres from all over the world. Authors engage with the role of popular music in contemporary music education,...


Global Challenges in Energy and Environment: Select Proceedings of ICEE 2018 (Lecture Notes on Multidisciplinary Industrial Engineering)
Global Challenges in Energy and Environment: Select Proceedings of ICEE 2018 (Lecture Notes on Multidisciplinary Industrial Engineering)
This book comprises select proceedings of the International Conference on Energy and Environment - Global Challenges (ICEE 2018). The book focuses on applications of green technologies in chemical and biochemical engineering, wastewater treatment, energy and environmental sustainability. It covers current environmental issues such as...
Open Your Eyes: Deaf Studies Talking
Open Your Eyes: Deaf Studies Talking
This book was born out of the Deaf Studies Think Tank, a three-day symposium in the summer of 2002 sponsored by the National Endowment for the Humanities, Gallaudet University’s Provost’s Offi ce, and the Gallaudet Research Institute. The Deaf Studies Think Tank convened twenty scholars to debate, discuss, and explore the issues and...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy